First published: Tue Nov 07 2006(Updated: )
Heap-based buffer overflow in loader_tga.c in imlib2 before 1.2.1, and possibly other versions, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TGA image.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Enlightenment Imlib2 | =1.1.1 | |
Enlightenment Imlib2 | =1.0 | |
Enlightenment Imlib2 | =1.0.5 | |
Enlightenment Imlib2 | =1.0.2 | |
Enlightenment Imlib2 | =1.1 | |
Enlightenment Imlib2 | =1.0.3 | |
Enlightenment Imlib2 | =1.0.4 | |
Enlightenment Imlib2 | =1.0.1 | |
Enlightenment Imlib2 | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4808 has a high severity rating due to its potential for causing a denial of service and the possibility of remote code execution.
CVE-2006-4808 affects multiple versions of imlib2, specifically versions prior to 1.2.1.
To fix CVE-2006-4808, upgrade to imlib2 version 1.2.1 or later.
CVE-2006-4808 is a heap-based buffer overflow vulnerability.
Attackers can exploit CVE-2006-4808 to crash the application or potentially execute arbitrary code on the affected system.