4.3
CVSSv2

CVE-2019-11498

Published: 24/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack up to and including 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow malicious users to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wavpack wavpack

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

canonical ubuntu linux 19.04

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #927903 wavpack: CVE-2019-11498: Uninitialized Read in WavpackSetConfiguration64() Package: src:wavpack; Maintainer for src:wavpack is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 24 Apr 2019 20:27:02 UTC ...
WavPack could be made to crash if it received a specially crafted file ...