Description
An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
References (8)
Core 8
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/dbry/WavPack/issues/33
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4197
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3637-1/
Patch, Third Party Advisory x_refsource_misc
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
Mailing List mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Dec/37
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/
Scores
CVSS v3
5.5
EPSS
0.0037
EPSS Percentile
59.1%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-787
Status
published
Products (3)
debian/debian_linux
8.0
debian/debian_linux
9.0
wavpack/wavpack
< 5.1.0
Published
Apr 29, 2018
Tracked Since
Feb 18, 2026