First published: Tue Apr 24 2018(Updated: )
An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libsdl2-image | 2.0.4+dfsg1-1+deb10u1 2.0.5+dfsg1-2 2.6.3+dfsg-1 2.6.3+dfsg-2 | |
debian/sdl-image1.2 | 1.2.12-10+deb10u1 1.2.12-12 1.2.12-13 | |
Libsdl Sdl Image | =2.0.2 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12122 is high with a score of 8.8.
The code execution vulnerability in CVE-2017-12122 is triggered by a specially crafted ILBM image that causes a heap overflow, leading to code execution.
The affected software versions for CVE-2017-12122 include libsdl2-image 2.0.2, sdl-image1.2 1.2.12, and various Debian Linux versions.
To fix CVE-2017-12122, update to the recommended versions of libsdl2-image or sdl-image1.2 depending on your system, as provided in the vulnerability description.
More information about CVE-2017-12122 can be found in the references provided: https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html, https://security.gentoo.org/glsa/201903-17, and https://www.debian.org/security/2018/dsa-4177.