Описание
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libsdl2-image | fixed | 2.0.5+dfsg1-1 | package | |
| libsdl2-image | no-dsa | buster | package | |
| libsdl2-image | no-dsa | stretch | package | |
| libsdl2-image | no-dsa | jessie | package | |
| sdl-image1.2 | fixed | 1.2.12-12 | package | |
| sdl-image1.2 | no-dsa | buster | package | |
| sdl-image1.2 | no-dsa | stretch | package | |
| sdl-image1.2 | no-dsa | jessie | package |
Примечания
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843
https://hg.libsdl.org/SDL_image/rev/95fc7da55247
EPSS
Связанные уязвимости
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
EPSS