MEDIUM · 6.5

CVE-2018-18584

In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.

Vulnerability Description

In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Cabextract ProjectCabextract< 1.8
Libmspack ProjectLibmspack0.3
DebianDebian Linux8.0
RedhatEnterprise Linux7.0
CanonicalUbuntu Linux12.04
SuseLinux Enterprise Server11
StarwindsoftwareStarwind Virtual San-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-18584?

CVE-2018-18584 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.

How severe is CVE-2018-18584?

CVE-2018-18584 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-18584?

Check the references section above for vendor advisories and patch information. Affected products include: Cabextract Project Cabextract, Libmspack Project Libmspack, Debian Debian Linux, Redhat Enterprise Linux, Canonical Ubuntu Linux.