Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-14636

Опубликовано: 22 сент. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-apps/xenial

released

0.49.2-3+deb8u3build0.16.04.1
esm-infra-legacy/trusty

released

0.49.2-3+deb8u3build0.14.04.1
precise/esm

DNE

trusty

released

0.49.2-3+deb8u3build0.14.04.1
trusty/esm

released

0.49.2-3+deb8u3build0.14.04.1
upstream

released

0.49.2-3+deb8u1
vivid/ubuntu-core

DNE

Показывать по

EPSS

Процентиль: 59%
0.00378
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 8 лет назад

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

CVSS3: 9.8
debian
больше 8 лет назад

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffff ...

CVSS3: 9.8
github
больше 3 лет назад

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

EPSS

Процентиль: 59%
0.00378
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3