First published: Wed Mar 14 2012(Updated: )
Integer overflow in the GnashImage::size method in libbase/GnashImage.h in GNU Gnash 0.8.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SWF file, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Gnash | =0.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1175 has a high severity level due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2012-1175, upgrade GNU Gnash to a version that resolves the integer overflow issue.
The affected software for CVE-2012-1175 is GNU Gnash version 0.8.10.
CVE-2012-1175 is an integer overflow vulnerability that may lead to a heap-based buffer overflow.
Attackers can exploit CVE-2012-1175 to cause a crash or potentially execute arbitrary code using a crafted SWF file.