{"id":"CVE-2019-1010305","details":"libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83c6d955234b4d.","modified":"2026-04-16T04:39:50.308471809Z","published":"2019-07-15T15:15:11.377Z","related":["ALSA-2020:1686","SUSE-SU-2020:1493-1","SUSE-SU-2020:2711-1","openSUSE-SU-2020:0746-1","openSUSE-SU-2024:13619-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXWNEY4CJBLPRKV6LG7FQUPD6WVZYBTB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2QJTUAGP22YY7453MHGTFN4YQE5HJBR/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00028.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00033.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4066-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4066-2/"},{"type":"REPORT","url":"https://github.com/kyz/libmspack/issues/27"},{"type":"FIX","url":"https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kyz/libmspack","events":[{"introduced":"0"},{"last_affected":"80fb91f3680f5acf96fd372b95c9b6205e0e9cbf"},{"fixed":"2f084136cfe0d05e5bf5703f3e83c6d955234b4d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.9.1-alpha"}]}}],"versions":["1.7","v0.0.20060920alpha","v0.3alpha","v0.4alpha","v0.5alpha","v0.6alpha","v0.7.1alpha","v0.7alpha","v0.8alpha","v0.9.1alpha","v0.9alpha","v1.0","v1.1","v1.2","v1.3","v1.4","v1.5","v1.8","v1.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1010305.json","vanir_signatures_modified":"2026-04-11T08:55:41Z","vanir_signatures":[{"id":"CVE-2019-1010305-07a71076","signature_type":"Function","deprecated":false,"source":"https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d","digest":{"function_hash":"143003715646316546023193163380321845075","length":6656},"target":{"function":"chmd_read_headers","file":"libmspack/mspack/chmd.c"},"signature_version":"v1"},{"id":"CVE-2019-1010305-3fba9dab","signature_version":"v1","deprecated":false,"source":"https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d","digest":{"threshold":0.9,"line_hashes":["205328432917050020152050304626220794031","107379853081505207412979443313635765537","175714249841792169746246946157874795907","103849227629512597044200399757065204356","267909811883072031992347919703370709146","167327124339254662897921557385068063234","253472555009064031300059264059326324180","21509889456730195697737899302891890500","216385481506619540661069628206663364342","67691593583077592570002243767481336384","72050113466814223188819607342005960750","24201053327704792448768183257481067363","16869722504524110794816662320602044952","319023267095004675747058669933082120523","59683095410329902082271370661158293057","96570387356960577522083627637160514080"]},"target":{"file":"libmspack/mspack/chmd.c"},"signature_type":"Line"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}