Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-5059

Опубликовано: 31 июл. 2019
Источник: debian
EPSS Низкий

Описание

An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libsdl2-imagefixed2.0.5+dfsg1-1package
libsdl2-imageno-dsabusterpackage
libsdl2-imageno-dsastretchpackage
libsdl2-imageno-dsajessiepackage
sdl-image1.2fixed1.2.12-12package
sdl-image1.2no-dsabusterpackage
sdl-image1.2no-dsastretchpackage
sdl-image1.2no-dsajessiepackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843

  • https://hg.libsdl.org/SDL_image/rev/95fc7da55247

EPSS

Процентиль: 76%
0.00987
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

CVSS3: 8.8
nvd
больше 6 лет назад

An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

CVSS3: 8.8
github
больше 3 лет назад

An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

suse-cvrf
больше 6 лет назад

Security update for SDL_image

suse-cvrf
больше 6 лет назад

Security update for SDL2_image

EPSS

Процентиль: 76%
0.00987
Низкий