Description
In Lizard v1.0 and LZ5 v2.0 (the prior release, before the product was renamed), there is an unchecked buffer size during a memcpy in the Lizard_decompress_LIZv1 function (lib/lizard_decompress_liz.h). Remote attackers can leverage this vulnerability to cause a denial of service via a crafted input file, as well as achieve remote code execution.
Published: 2018-05-26
Score: 7.8 High
EPSS: 2.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-3527 In Lizard v1.0 and LZ5 v2.0 (the prior release, before the product was renamed), there is an unchecked buffer size during a memcpy in the Lizard_decompress_LIZv1 function (lib/lizard_decompress_liz.h). Remote attackers can leverage this vulnerability to cause a denial of service via a crafted input file, as well as achieve remote code execution.
References
History

No history.

Subscriptions

Lizard Project Lizard Lz5
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:10:14.550Z

Reserved: 2018-05-26T00:00:00.000Z

Link: CVE-2018-11498

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-26T20:29:00.357

Modified: 2024-11-21T03:43:29.470

Link: CVE-2018-11498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses