You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A stack-based buffer overflow vulnerability exists in WavPack 5.4.0 and earlier. It is discovered by Baidu Fuzzing platform. This vulnerability allows local or remote attackers to launch a code execution or a denial of service attack.
Vulnerability Description
Wavpack does not check the length of infilename when openning it. If the file does not exist, the size of infilename could exceed 512, which will overflow the error_msg buffer.
First of all thank you @qian-feng for reporting this bug. Good catch! I have pushed a fix for this just now.
However I take strong exception to your statement that “this vulnerability allows local or remote attackers to launch a code execution or a denial of service attack.” How could an attacker possibly use this to launch any kind of attack?
The WavPack command-line programs are not the default application for any file type and are not supplied by default in any distro. Therefore the attacker would have to convince a user to install the command-line program and then download and run a specially crafted batch or script file, or copy and paste a huge line into a terminal window.
In other words, to exploit this vulnerability the attacker must already be able to run commands on the system, which of course means it’s not a vulnerability at all. For example, it would be far easier to just do this (on Linux) because it would not require WavPack (and I’m sure a similar trick would work on Windows):
I greatly appreciate the reporting of these bugs and I enjoy fixing them and improving my programs. However, I don’t feel that presenting this as a true threat with an exaggerated description does anyone any good, nor does it make the Internet any safer. If anything, it makes the Internet less safe because it’s a distraction that takes developer and maintainer resources away from actual vulnerabilities.
Summary
A stack-based buffer overflow vulnerability exists in WavPack 5.4.0 and earlier. It is discovered by Baidu Fuzzing platform. This vulnerability allows local or remote attackers to launch a code execution or a denial of service attack.
Vulnerability Description
Wavpack does not check the length of infilename when openning it. If the file does not exist, the size of infilename could exceed 512, which will overflow the error_msg buffer.
WavPack 5.4.0/cli/utils.c:438
WavPack 5.4.0/cli/wavpack.c:1546
Steps to reproduce
The text was updated successfully, but these errors were encountered: