First published: Thu Apr 22 2010(Updated: )
Multiple heap-based buffer overflows in imlib2 1.4.3 allow context-dependent attackers to execute arbitrary code via a crafted (1) ARGB, (2) XPM, or (3) BMP file, related to the IMAGE_DIMENSIONS_OK macro in lib/image.h.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Enlightenment Imlib2 | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0991 has a high severity due to the potential for remote code execution from heap-based buffer overflows.
To fix CVE-2010-0991, upgrade imlib2 to version 1.4.4 or later, which addresses the buffer overflow vulnerabilities.
CVE-2010-0991 can be exploited through crafted ARGB, XPM, and BMP files.
Users of imlib2 version 1.4.3 are at risk of exploitation through this vulnerability.
The implications of CVE-2010-0991 include the potential for attackers to execute arbitrary code on affected systems.