First published: Mon Oct 26 2015(Updated: )
io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =13.2 | |
gdk-pixbuf | <=2.31.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7673 has a high severity rating due to its potential to cause a denial of service and arbitrary code execution.
The recommended fix for CVE-2015-7673 is to update gdk-pixbuf to version 2.32.0 or later.
CVE-2015-7673 affects gdk-pixbuf versions up to and including 2.31.4.
Yes, CVE-2015-7673 can be exploited remotely via a crafted Truevision TGA file.
CVE-2015-7673 represents a heap-based buffer overflow vulnerability.