{"id":"ALPINE-CVE-2018-18586","details":"chmextract.c in the chmextract sample program, as distributed with libmspack before 0.8alpha, does not protect against absolute/relative pathnames in CHM files, leading to Directory Traversal. NOTE: the vendor disputes that this is a libmspack vulnerability, because chmextract.c was only intended as a source-code example, not a supported application","modified":"2025-11-19T06:13:34.674185Z","published":"2018-10-23T02:29:00.700Z","upstream":["CVE-2018-18586"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2018-18586"}],"affected":[{"package":{"name":"libmspack","ecosystem":"Alpine:v3.10","purl":"pkg:apk/alpine/libmspack?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8_alpha-r0"}]}],"versions":["0.5_alpha-r1","0.7.1_alpha-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-18586.json"}},{"package":{"name":"libmspack","ecosystem":"Alpine:v3.11","purl":"pkg:apk/alpine/libmspack?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8_alpha-r0"}]}],"versions":["0.5_alpha-r1","0.7.1_alpha-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-18586.json"}},{"package":{"name":"libmspack","ecosystem":"Alpine:v3.6","purl":"pkg:apk/alpine/libmspack?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8_alpha-r0"}]}],"versions":["0.5_alpha-r1","0.7.1_alpha-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-18586.json"}},{"package":{"name":"libmspack","ecosystem":"Alpine:v3.7","purl":"pkg:apk/alpine/libmspack?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8_alpha-r0"}]}],"versions":["0.5_alpha-r1","0.7.1_alpha-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-18586.json"}},{"package":{"name":"libmspack","ecosystem":"Alpine:v3.8","purl":"pkg:apk/alpine/libmspack?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8_alpha-r0"}]}],"versions":["0.5_alpha-r1","0.7.1_alpha-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-18586.json"}},{"package":{"name":"libmspack","ecosystem":"Alpine:v3.9","purl":"pkg:apk/alpine/libmspack?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8_alpha-r0"}]}],"versions":["0.5_alpha-r1","0.7.1_alpha-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-18586.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}