CVE-2014-9732 The advisory has been revoked - it doesn't affect any version of package cabextract  (opens in a new tab)


Threat Intelligence

EPSS
1.47% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1604-CABEXTRACT-669601
  • published11 Jun 2015
  • disclosed11 Jun 2015

Introduced: 11 Jun 2015

CVE-2014-9732  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:16.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cabextract package and not the cabextract package as distributed by Ubuntu.

The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.