SB2018050108 - Buffer overflow in wavpack (Alpine package)
Published: May 1, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2018-10538)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error within ParseRiffHeaderConfig function in riff.c when processing WAV files. A remote unauthenticated attacker can create a specially crafted WAV file, trick the victim into opening it and trigger integer overflow in bytes_to_copy calculation and subsequent malloc call
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=fcfac0bb84e91ad39d8554e3ff04d2aacc625915
- https://git.alpinelinux.org/aports/commit/?id=ac2fd8a89cfc84daba107884f80429f966353415
- https://git.alpinelinux.org/aports/commit/?id=e5938228bdfcb80390ff361b79966fdcf0fdb35a
- https://git.alpinelinux.org/aports/commit/?id=f06887bf6720ff8c26e5a7e3b87488cb2be83be2
- https://git.alpinelinux.org/aports/commit/?id=07d81b1f2d83bfc9c1f45c734527ab3e6ae8eeea
- https://git.alpinelinux.org/aports/commit/?id=765701851a72e5ffe1b0bf5043347ae70cd7dc47
- https://git.alpinelinux.org/aports/commit/?id=770d5dd56f9cec7d85d5e51c19fa43a82c287db3
- https://git.alpinelinux.org/aports/commit/?id=7d038ebfd5a1264a936278c3c4151f569de1a595
- https://git.alpinelinux.org/aports/commit/?id=edcdebbe810d7702ca7a9725eafc7b77ab8955aa