Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14636

Опубликовано: 22 сент. 2017
Источник: debian

Описание

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sam2premovedpackage
sam2pfixed0.49.2-3+deb8u1jessiepackage

Примечания

  • https://github.com/pts/sam2p/issues/14 (bug 4)

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

CVSS3: 9.8
nvd
больше 8 лет назад

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

CVSS3: 9.8
github
больше 3 лет назад

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.