Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16663

Опубликовано: 08 нояб. 2017
Источник: debian

Описание

In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sam2premovedpackage
sam2pfixed0.49.2-3+deb8u1jessiepackage

Примечания

  • https://github.com/pts/sam2p/issues/16

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 8 лет назад

In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.

CVSS3: 5.5
nvd
около 8 лет назад

In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.

CVSS3: 5.5
github
больше 3 лет назад

In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.