{"id":"CVE-2018-14679","details":"An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).","modified":"2026-04-16T06:17:11.051961989Z","published":"2018-07-28T23:29:00.250Z","related":["SUSE-SU-2018:2323-1","SUSE-SU-2018:2323-2","SUSE-SU-2021:14850-1","SUSE-SU-2021:2802-1","SUSE-SU-2021:3853-1","SUSE-SU-2021:3859-1","SUSE-SU-2025:0325-1","SUSE-SU-2025:0327-1","SUSE-SU-2025:0328-1","openSUSE-SU-2021:1200-1","openSUSE-SU-2021:2802-1","openSUSE-SU-2024:10958-1","openSUSE-SU-2025:14683-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3728-3/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3789-2/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2018/07/26/1"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041410"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201903-20"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3728-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4260"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3327"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3728-1/"},{"type":"FIX","url":"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a"},{"type":"FIX","url":"https://bugs.debian.org/904802"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kyz/libmspack","events":[{"introduced":"0"},{"last_affected":"25be5e56c1f140dfed754073c7dc374fd4d3010a"},{"introduced":"0"},{"last_affected":"a22627dd5180e0ce9c558d0c10b174c760085f57"},{"introduced":"0"},{"last_affected":"164fb2d23a0894b726b72a047d34191d64a18104"},{"introduced":"0"},{"last_affected":"03296dd44347ab3111ba23b8e3945e2b537b6275"},{"introduced":"0"},{"last_affected":"a2b36d2f477a183c046b66c731936fa56eba53b4"},{"introduced":"0"},{"last_affected":"1668a2a82aac259c9bbc6356648b79411fa7db0d"},{"fixed":"72e70a921f0f07fee748aec2274b30784e1d312a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.0.20060920-alpha"},{"introduced":"0"},{"last_affected":"0.3-alpha"},{"introduced":"0"},{"last_affected":"0.4-alpha"},{"introduced":"0"},{"last_affected":"0.5-alpha"},{"introduced":"0"},{"last_affected":"0.6-alpha"},{"introduced":"0"},{"last_affected":"1.5"}]}}],"versions":["v0.0.20060920alpha","v0.3alpha","v0.4alpha","v0.5alpha","v0.6alpha","v1.0","v1.1","v1.2","v1.3","v1.4","v1.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14679.json","vanir_signatures_modified":"2026-04-11T12:27:33Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]}],"vanir_signatures":[{"id":"CVE-2018-14679-4ca3b7ad","source":"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a","signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["49925043302351673514388068494701907030","161712808870032329900961784810405018411","121485490807141736114950494978058559156","7489023390805984363603892804880154015","202644202232952523655974633013653707746","138619896882174347564468407303695257759","15990234950511709168994928365836356022","256898133550272973989357990071546787788","312328057604315597105613547714626917165","333854538769822575592451592026482133150","311166430157540248862665973352097654759","219884059926347081211079070659462285352","147707688935502192171362132058820901553","165585480514541969929312430367339872957"]},"deprecated":false,"target":{"file":"libmspack/mspack/chmd.c"}},{"id":"CVE-2018-14679-7d4dd999","source":"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"107258753819447024680002702952495521063","length":6599},"deprecated":false,"target":{"function":"chmd_read_headers","file":"libmspack/mspack/chmd.c"}},{"id":"CVE-2018-14679-c6a42638","source":"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a","signature_version":"v1","signature_type":"Function","digest":{"function_hash":"190023709558236809867088071942484683680","length":1351},"deprecated":false,"target":{"function":"read_chunk","file":"libmspack/mspack/chmd.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}