CVE-2018-18586
Published: 23 October 2018
** DISPUTED ** chmextract.c in the chmextract sample program, as distributed with libmspack before 0.8alpha, does not protect against absolute/relative pathnames in CHM files, leading to Directory Traversal. NOTE: the vendor disputes that this is a libmspack vulnerability, because chmextract.c was only intended as a source-code example, not a supported application.
Notes
Author | Note |
---|---|
mdeslaur | clamav in xenial+ uses the system libmspack, trusty uses the embedded one. chmextract example isn't shipped in binary packages |
Priority
Status
Package | Release | Status |
---|---|---|
clamav Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(uses system libmspack)
|
cosmic |
Not vulnerable
(uses system libmspack)
|
|
precise |
Not vulnerable
(code not compiled)
|
|
trusty |
Not vulnerable
(code not compiled)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(uses system libmspack)
|
|
libmspack Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not compiled)
|
cosmic |
Not vulnerable
(code not compiled)
|
|
precise |
Does not exist
|
|
trusty |
Not vulnerable
(code not compiled)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not compiled)
|
|
Patches: upstream: https://github.com/kyz/libmspack/commit/7cadd489698be117c47efcadd742651594429e6d |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |