In Lizard v1.0 and LZ5 v2.0 (the prior release, before the product was renamed), there is an unchecked buffer size during a memcpy in the LizarddecompressLIZv1 function (lib/lizarddecompressliz.h). Remote attackers can leverage this vulnerability to cause a denial of service via a crafted input file, as well as achieve remote code execution.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.0"
}
]
}