Vulnerabilities > CVE-2016-10169 - Out-of-bounds Read vulnerability in Wavpack Project Wavpack
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Overread Buffers An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-0607-1.NASL description This update for wavpack fixes the following issues : - CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 107142 published 2018-03-06 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107142 title SUSE SLES11 Security Update : wavpack (SUSE-SU-2018:0607-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-0608-1.NASL description This update for wavpack fixes the following issues : - CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 107143 published 2018-03-06 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/107143 title SUSE SLED12 / SLES12 Security Update : wavpack (SUSE-SU-2018:0608-1) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_F1075415F5E911E6A4E25404A68AD561.NASL description David Bryant reports : global buffer overread in read_code / read_words.c heap out of bounds read in WriteCaffHeader / caff.c heap out of bounds read in unreorder_channels / wvunpack.c heap oob read in read_new_config_info / open_utils.c last seen 2020-06-01 modified 2020-06-02 plugin id 97251 published 2017-02-21 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97251 title FreeBSD : wavpack -- multiple invalid memory reads (f1075415-f5e9-11e6-a4e2-5404a68ad561) NASL family Fedora Local Security Checks NASL id FEDORA_2017-9D7F592A03.NASL description Update wavpack to 5.1.0 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2017-02-06 plugin id 96989 published 2017-02-06 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96989 title Fedora 24 : wavpack (2017-9d7f592a03) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-2413.NASL description According to the version of the wavpack package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.(CVE-2016-10169) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-08 modified 2019-12-10 plugin id 131905 published 2019-12-10 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/131905 title EulerOS 2.0 SP2 : wavpack (EulerOS-SA-2019-2413) NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-227.NASL description This update for wavpack fixes the following issues : - CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483) This update was imported from the SUSE:SLE-12:Update update project. last seen 2020-06-05 modified 2018-03-07 plugin id 107182 published 2018-03-07 reporter This script is Copyright (C) 2018-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/107182 title openSUSE Security Update : wavpack (openSUSE-2018-227) NASL family Fedora Local Security Checks NASL id FEDORA_2017-16F06EE9D8.NASL description Update wavpack to 5.1.0 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2017-02-21 plugin id 97238 published 2017-02-21 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97238 title Fedora 25 : mingw-wavpack (2017-16f06ee9d8) NASL family Fedora Local Security Checks NASL id FEDORA_2017-3893B6E15B.NASL description Update wavpack to 5.1.0 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2017-02-22 plugin id 97309 published 2017-02-22 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97309 title Fedora 24 : mingw-wavpack (2017-3893b6e15b) NASL family Fedora Local Security Checks NASL id FEDORA_2017-AB4F51572F.NASL description Update wavpack to 5.1.0 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2017-02-03 plugin id 96967 published 2017-02-03 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96967 title Fedora 25 : wavpack (2017-ab4f51572f) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-2680.NASL description According to the versions of the wavpack package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.(CVE-2018-19840) - The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.(CVE-2016-10169) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-08 modified 2019-12-18 plugin id 132215 published 2019-12-18 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/132215 title EulerOS 2.0 SP3 : wavpack (EulerOS-SA-2019-2680) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-2195.NASL description According to the version of the wavpack package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.(CVE-2016-10169) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-08 modified 2019-11-08 plugin id 130657 published 2019-11-08 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130657 title EulerOS 2.0 SP5 : wavpack (EulerOS-SA-2019-2195) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3568-1.NASL description Hanno Bock discovered that WavPack incorrectly handled certain WV files. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10169) Joonun Jang discovered that WavPack incorrectly handled certain RF64 files. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 17.10. (CVE-2018-6767). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 106794 published 2018-02-13 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/106794 title Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : wavpack vulnerabilities (USN-3568-1)