Описание
Multiple integer overflows in operations/external/ppm-load.c in GEGL (Generic Graphics Library) 0.2.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a large (1) width or (2) height value in a Portable Pixel Map (ppm) image, which triggers a heap-based buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | not-affected | 0.3.4-1ubuntu2 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [0.2.0-4ubuntu1]] |
hardy | DNE | |
lucid | ignored | end of life |
oneiric | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
quantal | ignored | end of life |
raring | ignored | end of life |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
Multiple integer overflows in operations/external/ppm-load.c in GEGL (Generic Graphics Library) 0.2.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a large (1) width or (2) height value in a Portable Pixel Map (ppm) image, which triggers a heap-based buffer overflow.
Multiple integer overflows in operations/external/ppm-load.c in GEGL (Generic Graphics Library) 0.2.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a large (1) width or (2) height value in a Portable Pixel Map (ppm) image, which triggers a heap-based buffer overflow.
Multiple integer overflows in operations/external/ppm-load.c in GEGL ( ...
7.5 High
CVSS2