wavpack is vulnerable to arbitrary code execution. A buffer overflow in the ParseCaffHeaderConfig
function in cli/caff.c
allows a remote attacker to execute arbitrary code via a malicious CAF file.
packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274
github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
github.com/dbry/WavPack/issues/26
seclists.org/bugtraq/2019/Dec/37
usn.ubuntu.com/3578-1/
www.debian.org/security/2018/dsa-4125
www.exploit-db.com/exploits/44154/