### [CVE-2018-7254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7254) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file. ### POC #### Reference - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274 - https://github.com/dbry/WavPack/issues/26 - https://www.exploit-db.com/exploits/44154/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/andir/nixos-issue-db-example