CVE-2018-18584
high-risk
Published 2018-10-23
In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
Do I need to act?
~
6.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (19)
Cabextract
Libmspack
Libmspack
Libmspack
Libmspack
Libmspack
Libmspack
Affected Vendors
References (22)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2049
Mailing List
https://bugs.debian.org/911640
Third Party Advisory
https://security.gentoo.org/glsa/201903-20
Third Party Advisory
https://usn.ubuntu.com/3814-1/
Third Party Advisory
https://usn.ubuntu.com/3814-2/
Third Party Advisory
https://usn.ubuntu.com/3814-3/
Third Party Advisory
https://www.starwindsoftware.com/security/sw-20181213-0001/
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2049
Mailing List
https://bugs.debian.org/911640
Third Party Advisory
https://security.gentoo.org/glsa/201903-20
Third Party Advisory
https://usn.ubuntu.com/3814-1/
Third Party Advisory
https://usn.ubuntu.com/3814-2/
Third Party Advisory
https://usn.ubuntu.com/3814-3/
and 2 more references
52
/ 100
high-risk
Severity
24/34 · High
Exploitability
9/34 · Low
Exposure
19/34 · Moderate