This security bulletin contains one low risk vulnerability.
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to the chmd_read_headers function, as defined in the mspack/chmd.c source code file of the affected software, accepts filenames that have embedded NULL bytes. A remote attacker can trick the victim into accessing a Compiled HTML (CHM) file that submits malicious input to the targeted system, trigger NULL pointer dereference and cause the service to crash.Mitigation
Update to version 0.8alpha.Vulnerable software versions
libmspack: 0.3 - 0.7Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?