### [CVE-2018-10540](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10540) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation. ### POC #### Reference - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html #### Github - https://github.com/aflsmart/aflsmart - https://github.com/andir/nixos-issue-db-example