Wavpack

Wavpack

17 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Published 19.07.2022 20:15:11
  • Last modified 21.11.2024 07:01:04

A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000...

Exploit
  • EPSS 0.08%
  • Published 10.03.2022 17:44:14
  • Last modified 21.11.2024 06:30:41

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.

Exploit
  • EPSS 0.41%
  • Published 28.12.2020 04:15:12
  • Last modified 21.11.2024 05:27:59

WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected.

Exploit
  • EPSS 1.38%
  • Published 11.07.2019 20:15:12
  • Last modified 21.11.2024 04:18:10

WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav...

Exploit
  • EPSS 1.38%
  • Published 11.07.2019 20:15:12
  • Last modified 21.11.2024 04:18:09

WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav fil...

Exploit
  • EPSS 0.83%
  • Published 11.07.2019 20:15:12
  • Last modified 21.11.2024 04:18:09

WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector...

Exploit
  • EPSS 1.97%
  • Published 24.04.2019 05:29:00
  • Last modified 21.11.2024 04:21:12

WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file ...

  • EPSS 0.35%
  • Published 04.12.2018 09:29:00
  • Last modified 21.11.2024 03:58:40

The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishan...

Exploit
  • EPSS 0.6%
  • Published 04.12.2018 09:29:00
  • Last modified 21.11.2024 03:58:40

The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvun...

Exploit
  • EPSS 0.38%
  • Published 29.04.2018 15:29:00
  • Last modified 21.11.2024 03:41:31

An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of int...