First published: Wed Jul 01 2015(Updated: )
Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libwmf | 0.2.8.4-17 0.2.12-5.1 0.2.13-1.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
libwmf | =0.2.8.4 | |
Red Hat Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4588 is classified as a high severity vulnerability due to its potential to cause denial of service and possibly allow arbitrary code execution.
To fix CVE-2015-4588, update the libwmf package to a secure version such as 0.2.8.4-17, 0.2.12-5.1, or 0.2.13-1.1.
CVE-2015-4588 affects users of libwmf versions 0.2.8.4 and earlier on Debian, openSUSE, and Fedora systems.
CVE-2015-4588 can be exploited via crafted WMF files that trigger a heap-based buffer overflow during image decoding.
A proof of concept for CVE-2015-4588 may exist in security communities, demonstrating how the vulnerability can be exploited.