Name | CVE-2018-18586 |
Description | chmextract.c in the chmextract sample program, as distributed with libmspack before 0.8alpha, does not protect against absolute/relative pathnames in CHM files, leading to Directory Traversal. NOTE: the vendor disputes that this is a libmspack vulnerability, because chmextract.c was only intended as a source-code example, not a supported application |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 911639 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libmspack (PTS) | jessie, jessie (lts) | 0.5-1+deb8u4 | vulnerable |
stretch (security), stretch (lts), stretch | 0.5-1+deb9u4 | vulnerable | |
buster | 0.10.1-1 | fixed | |
bullseye | 0.10.1-2 | fixed | |
bookworm | 0.11-1 | fixed | |
sid, trixie | 0.11-1.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libmspack | source | (unstable) | 0.8-1 | unimportant | 911639 |
https://github.com/kyz/libmspack/commit/7cadd489698be117c47efcadd742651594429e6d
https://www.openwall.com/lists/oss-security/2018/10/22/1
src/chmextract.c was renamed from originally test/chmx.c
This sample code is not installed into the binary packages and was as well
never the idea to use it in "productised" binaries, but rather just simple
examples of the library use.