Stack-based buffer overflow in libmspack - CVE-2018-14681

 

Stack-based buffer overflow in libmspack - CVE-2018-14681

Published: July 31, 2018 / Updated: August 1, 2018


Vulnerability identifier: #VU14159
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2018-14681
CWE-ID: CWE-121
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Stuart Caie
Affected software:
libmspack

Detailed vulnerability description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to stack-based buffer overflow in the kwajd_read_headers function, as defined in the mspack/kwajd.c source code file. A local attacker can send a specially crafted request that submits malicious input, trigger memory corruption and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.


How to mitigate CVE-2018-14681

Update to version 0.7.

Sources