{"id":"CVE-2018-10536","details":"An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.","modified":"2026-04-16T06:18:55.049876723Z","published":"2018-04-29T15:29:00.333Z","related":["SUSE-SU-2021:0186-1","openSUSE-SU-2021:0153-1","openSUSE-SU-2021:0154-1"],"references":[{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Dec/37"},{"type":"WEB","url":"http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4197"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3637-1/"},{"type":"REPORT","url":"https://github.com/dbry/WavPack/issues/32"},{"type":"REPORT","url":"https://github.com/dbry/WavPack/issues/30"},{"type":"REPORT","url":"https://github.com/dbry/WavPack/issues/31"},{"type":"FIX","url":"https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dbry/wavpack","events":[{"introduced":"0"},{"last_affected":"9ccc3fe4a37d069137ceabe513a4dd9b0a09c1c2"},{"fixed":"26cb47f99d481ad9b93eeff80d26e6b63bbd7e15"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.0"}]}}],"versions":["4.70.0","4.70.0-rc","4.75.0","4.75.0-rc","4.75.2","4.80.0","4.80.0-rc","5.0.0","5.0.0-alpha","5.0.0-alpha2","5.0.0-alpha3","5.0.0-alpha4","5.0.0-alpha5","5.1.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"vanir_signatures_modified":"2026-04-11T06:58:33Z","vanir_signatures":[{"signature_type":"Line","id":"CVE-2018-10536-504d4a8e","signature_version":"v1","deprecated":false,"source":"https://github.com/dbry/wavpack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15","target":{"file":"cli/riff.c"},"digest":{"line_hashes":["184646861603546030796083882222520450240","84312685334654223078823520833341925555","154082140996508720341843738016562010053","252660553131924893101833006221813729282","1343942213833317061756424501775694324","308077053378223483629199569743747749424","93649652678570829531834480878423478937"],"threshold":0.9}},{"signature_type":"Function","id":"CVE-2018-10536-73ffe786","signature_version":"v1","deprecated":false,"source":"https://github.com/dbry/wavpack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15","target":{"function":"ParseRiffHeaderConfig","file":"cli/riff.c"},"digest":{"length":7983,"function_hash":"140476048034579333997910718229279907451"}},{"signature_type":"Function","id":"CVE-2018-10536-96af42bf","signature_version":"v1","deprecated":false,"digest":{"length":6624,"function_hash":"118300800463717199926781613989967737417"},"target":{"function":"ParseWave64HeaderConfig","file":"cli/wave64.c"},"source":"https://github.com/dbry/wavpack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15"},{"signature_type":"Line","id":"CVE-2018-10536-9901ed41","signature_version":"v1","deprecated":false,"source":"https://github.com/dbry/wavpack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15","target":{"file":"cli/wave64.c"},"digest":{"line_hashes":["332865019631066372223500709303797431877","280271726020800377614925935580540570684","138012726190409765382337285991215305476","286662417744728389179015073645145507988","106166235591341177200476569566427557660","69502089290313573260304176946327060439","60925149395709222123254455234564749263"],"threshold":0.9}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10536.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}