CVE-2018-6767

Name
CVE-2018-6767
Description
A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://github.com/dbry/WavPack/issues/27
Patch https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5
Exploit https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276
Third Party Advisory https://www.debian.org/security/2018/dsa-4125
Third Party Advisory https://usn.ubuntu.com/3568-1/
BUGTRAQ https://seclists.org/bugtraq/2019/Dec/37
MISC http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:wavpack:wavpack:5.1.0:*:*:*:*:*:*:* wavpack == None == 5.1.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
wavpack 3.11-main 5.1.0-r8 Natanael Copa <ncopa@alpinelinux.org> fixed