First published: Wed Aug 14 2013(Updated: )
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
LibRaw | <=0.15.1 | |
LibRaw | =0.15.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 | |
openSUSE | =12.2 | |
openSUSE | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2126 has been classified with a moderate severity rating due to its potential to cause application crashes and possible remote code execution.
To fix CVE-2013-2126, upgrade to LibRaw version 0.15.2 or later to patch the double free vulnerabilities.
CVE-2013-2126 affects LibRaw versions prior to 0.15.2, including 0.15.0 and 0.15.1.
Yes, CVE-2013-2126 affects LibRaw on multiple operating systems including Ubuntu 12.04, 12.10, and 13.04, as well as openSUSE 12.2 and 12.3.
CVE-2013-2126 can be triggered by malformed full-color Foveon or sRAW image files.