First published: Tue Nov 07 2006(Updated: )
Stack-based buffer overflow in loader_pnm.c in imlib2 before 1.2.1, and possibly other versions, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM image.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Enlightenment Imlib2 | =1.1.1 | |
Enlightenment Imlib2 | =1.0 | |
Enlightenment Imlib2 | =1.0.5 | |
Enlightenment Imlib2 | =1.0.2 | |
Enlightenment Imlib2 | =1.1 | |
Enlightenment Imlib2 | =1.0.3 | |
Enlightenment Imlib2 | =1.0.4 | |
Enlightenment Imlib2 | =1.0.1 | |
Enlightenment Imlib2 | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4809 is classified as a high-severity vulnerability due to the potential for denial of service and arbitrary code execution.
To address CVE-2006-4809, upgrade to imlib2 version 1.2.1 or later where the vulnerability has been patched.
The impact of CVE-2006-4809 includes crashing the application and potentially executing arbitrary code if exploited.
CVE-2006-4809 affects imlib2 versions prior to 1.2.1, including 1.0.x and 1.1.x series.
Yes, exploiting CVE-2006-4809 requires user assistance, typically by opening a crafted PNM image.