First published: Tue Apr 24 2018(Updated: )
An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a stack overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libsdl2-image | 2.0.4+dfsg1-1+deb10u1 2.0.5+dfsg1-2 2.6.3+dfsg-1 2.6.3+dfsg-2 | |
debian/sdl-image1.2 | 1.2.12-10+deb10u1 1.2.12-12 1.2.12-13 | |
Libsdl Sdl Image | =2.0.2 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14440 is a code execution vulnerability in the ILBM image rendering functionality of SDL2_image-2.0.2.
An attacker can display a specially crafted ILBM image to trigger a stack overflow resulting in code execution.
CVE-2017-14440 has a severity rating of 8.8 (high).
SDL2_image-2.0.2 is affected. For Debian Linux, versions 7.0, 8.0, and 9.0 are affected.
For SDL2_image-2.0.2, update to version 2.0.4+dfsg1-1+deb10u1, 2.0.5+dfsg1-2, 2.6.3+dfsg-1, or 2.6.3+dfsg-2. For Debian Linux, update to version 1.2.12-10+deb10u1, 1.2.12-12, or 1.2.12-13.