SB2018050107 - Heap-based buffer overwrite in wavpack (Alpine package)
Published: May 1, 2018
Security Bulletin ID
SB2018050107
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Heap-based buffer overwrite (CVE-ID: CVE-2018-10536)
The vulnerability allows a local attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists in the WAV parser component due to improper rejection of multiple format chunks by the ParseRiffHeaderConfig function, as defined in the riff.c source code file. A local attacker can execute a specially crafted .wav file, trigger heap buffer overwrite and cause the service to crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=fcfac0bb84e91ad39d8554e3ff04d2aacc625915
- https://git.alpinelinux.org/aports/commit/?id=ac2fd8a89cfc84daba107884f80429f966353415
- https://git.alpinelinux.org/aports/commit/?id=e5938228bdfcb80390ff361b79966fdcf0fdb35a
- https://git.alpinelinux.org/aports/commit/?id=f06887bf6720ff8c26e5a7e3b87488cb2be83be2
- https://git.alpinelinux.org/aports/commit/?id=07d81b1f2d83bfc9c1f45c734527ab3e6ae8eeea
- https://git.alpinelinux.org/aports/commit/?id=765701851a72e5ffe1b0bf5043347ae70cd7dc47
- https://git.alpinelinux.org/aports/commit/?id=770d5dd56f9cec7d85d5e51c19fa43a82c287db3
- https://git.alpinelinux.org/aports/commit/?id=7d038ebfd5a1264a936278c3c4151f569de1a595
- https://git.alpinelinux.org/aports/commit/?id=edcdebbe810d7702ca7a9725eafc7b77ab8955aa