First published: Tue Jun 02 2015(Updated: )
A heap buffer overflow flaw was found in the way the libwmf library processed WMF files containing BMP images. A specially crafted WMF file could cause an application using libwmf to crash or, possibly, execute arbitrary code. Original report: <a href="http://seclists.org/oss-sec/2015/q2/597">http://seclists.org/oss-sec/2015/q2/597</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libwmf | 0.2.8.4-17 0.2.12-5.1 0.2.13-1.1 | |
libwmf | =0.2.8.4 | |
Red Hat Fedora | =21 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-0848 is considered high due to the potential for remote code execution.
To mitigate CVE-2015-0848, upgrade to a version of libwmf that is not affected, such as 0.2.8.4-18 or newer.
Applications using vulnerable versions of the libwmf library to process WMF files containing BMP images are affected by CVE-2015-0848.
Yes, CVE-2015-0848 can be exploited remotely if a user opens a specially crafted WMF file.
CVE-2015-0848 affects multiple operating systems that utilize the vulnerable versions of the libwmf library, including Debian, Fedora, and openSUSE.