Описание
In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | DNE | |
| bionic | DNE | |
| devel | DNE | |
| esm-apps/xenial | released | 0.49.2-3+deb8u3build0.16.04.1 |
| esm-infra-legacy/trusty | released | 0.49.2-3+deb8u3build0.14.04.1 |
| precise/esm | DNE | |
| trusty | released | 0.49.2-3+deb8u3build0.14.04.1 |
| trusty/esm | released | 0.49.2-3+deb8u3build0.14.04.1 |
| upstream | released | 0.49.2-3+deb8u1 |
| xenial | released | 0.49.2-3+deb8u3build0.16.04.1 |
Показывать по
4.3 Medium
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.
In sam2p 0.49.4, there are integer overflows (with resultant heap-base ...
In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because "width * height" multiplications occur unsafely.
4.3 Medium
CVSS2
5.5 Medium
CVSS3