Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-7254 — Out-of-bounds Read in Wavpack
Severity
7.8HIGHNVD
EPSS
21.3%
top 4.30%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 19
Latest updateMay 13
Description
The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 9.0
Patches
🔴Vulnerability Details
2💥Exploits & PoCs
3📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2018-7254 mingw-wavpack: wavpack: Heap-based buffer over-read in ParseCaffHeaderConfig function in cli/caff.c [epel-7]↗2018-02-21
Bugzilla▶
CVE-2018-7254 mingw-wavpack: wavpack: Heap-based buffer over-read in ParseCaffHeaderConfig function in cli/caff.c [fedora-all]↗2018-02-21
Bugzilla▶
CVE-2018-7254 wavpack: Global buffer over-read in ParseCaffHeaderConfig function in cli/caff.c↗2018-02-21
Bugzilla▶
CVE-2018-7254 wavpack: Heap-based buffer over-read in ParseCaffHeaderConfig function in cli/caff.c [fedora-all]↗2018-02-21