CVE-2018-18584

In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.3:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.4:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.5:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.6:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.7:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.7.1:alpha:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:ga:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*

Configuration 6 (hide)

cpe:2.3:a:starwindsoftware:starwind_virtual_san:-:*:*:*:*:vsphere:*:*

History

25 Oct 2022, 16:49

Type Values Removed Values Added
First Time Starwindsoftware starwind Virtual San
Starwindsoftware
References (MISC) https://www.starwindsoftware.com/security/sw-20181213-0001/ - (MISC) https://www.starwindsoftware.com/security/sw-20181213-0001/ - Third Party Advisory
CPE cpe:2.3:a:starwindsoftware:starwind_virtual_san:-:*:*:*:*:vsphere:*:*

11 Oct 2022, 21:15

Type Values Removed Values Added
References
  • {'url': 'https://www.suse.com/security/cve/CVE-2018-18584/', 'name': 'https://www.suse.com/security/cve/CVE-2018-18584/', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://packetstormsecurity.com/files/150310/Ubuntu-Security-Notice-USN-3814-3.html', 'name': 'https://packetstormsecurity.com/files/150310/Ubuntu-Security-Notice-USN-3814-3.html', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/cve-2018-18584', 'name': 'https://access.redhat.com/security/cve/cve-2018-18584', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • (MISC) https://www.starwindsoftware.com/security/sw-20181213-0001/ -

12 May 2021, 20:52

Type Values Removed Values Added
CPE cpe:2.3:a:kyzer:limbspack:0.4:alpha:*:*:*:*:*:*
cpe:2.3:a:kyzer:limbspack:0.6:alpha:*:*:*:*:*:*
cpe:2.3:a:kyzer:limbspack:0.3:alpha:*:*:*:*:*:*
cpe:2.3:a:kyzer:limbspack:0.7.1:alpha:*:*:*:*:*:*
cpe:2.3:a:kyzer:limbspack:0.7:alpha:*:*:*:*:*:*
cpe:2.3:a:kyzer:limbspack:0.5:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.4:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.7.1:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.3:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.5:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.6:alpha:*:*:*:*:*:*
cpe:2.3:a:libmspack_project:libmspack:0.7:alpha:*:*:*:*:*:*
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2049 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2049 - Third Party Advisory

26 Apr 2021, 11:45

Type Values Removed Values Added
CPE cpe:2.3:a:kyzer:cabextract:*:*:*:*:*:*:*:* cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:*

Information

Published : 2018-10-23 02:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-18584

Mitre link : CVE-2018-18584

CVE.ORG link : CVE-2018-18584


JSON object : View

Products Affected

starwindsoftware

  • starwind_virtual_san

redhat

  • enterprise_linux

libmspack_project

  • libmspack

suse

  • linux_enterprise_server

debian

  • debian_linux

cabextract_project

  • cabextract

canonical

  • ubuntu_linux
CWE
CWE-787

Out-of-bounds Write