Executive Summary
Summary | |
---|---|
Title | WavPack vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-3637-1 | First vendor Publication | 2018-04-30 |
Vendor | Ubuntu | Last vendor Modification | 2018-04-30 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 17.10 Summary: Several security issues were fixed in WavPackXXX-APP-XXX. Software Description: - wavpack: audio codec (lossy and lossless) - encoder and decoder Details: Thuan Pham,テつ テつ Marcel Bテδカhme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to execute arbitrary code or cause a denial of service. (CVE-2018-10536, CVE-2018-10537) Thuan Pham,テつ テつ Marcel Bテδカhme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to cause a denial of service. (CVE-2018-10538, CVE-2018-10539, CVE-2018-10540) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: テつ wavpackテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 5.1.0-2ubuntu1.1 Ubuntu 17.10: テつ wavpackテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 5.1.0-2ubuntu0.3 In general, a standard system update will make all the necessary changes. References: テつ https://usn.ubuntu.com/usn/usn-3637-1 テつ CVE-2018-10536, CVE-2018-10537, CVE-2018-10538, CVE-2018-10539, テつ CVE-2018-10540 Package Information: テつ https://launchpad.net/ubuntu/+source/wavpack/5.1.0-2ubuntu1.1 テつ https://launchpad.net/ubuntu/+source/wavpack/5.1.0-2ubuntu0.3 |
Original Source
Url : http://www.ubuntu.com/usn/USN-3637-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
80 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
20 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 2 |
Nessusツョ Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-17a97bb25b.nasl - Type : ACT_GATHER_INFO |
2018-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2018-d6002f761d.nasl - Type : ACT_GATHER_INFO |
2018-05-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_50210bc154ef11e895d99c5c8e75236a.nasl - Type : ACT_GATHER_INFO |
2018-05-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4197.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-06-13 21:21:35 |
|
2018-05-01 05:18:09 |
|