### [CVE-2018-6767](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6767) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file. ### POC #### Reference - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276 - https://github.com/dbry/WavPack/issues/27 - https://github.com/dbry/WavPack/issues/27 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/andir/nixos-issue-db-example