Computer Security
[EN] securityvulns.ru no-pyccku


imlib2 library buffer overflow
updated since 29.05.2008
Published:29.05.2008
Source:
SecurityVulns ID:9037
Type:library
Threat Level:
6/10
Description:Buffer overflow on PNM and XPM files parsing in load() function.
CVE:CVE-2008-5187 (The load function in the XPM loader for imlib2 1.4.2, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file that triggers a "pointer arithmetic error" and a heap-based buffer overflow, a different vulnerability than CVE-2008-2426.)
 CVE-2008-2426 (Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.)
Original documentdocumentUBUNTU, [Full-disclosure] [USN-683-1] Imlib2 vulnerability (02.12.2008)
 documentSECUNIA, Secunia Research: imlib2 PNM and XPM Buffer Overflow (29.05.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod