First published: Tue Apr 24 2018(Updated: )
An exploitable code execution vulnerability exists in the ICO image rendering functionality of SDL2_image-2.0.2. A specially crafted ICO image can cause an integer overflow, cascading to a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libsdl2-image | 2.0.4+dfsg1-1+deb10u1 2.0.5+dfsg1-2 2.6.3+dfsg-1 2.6.3+dfsg-2 | |
debian/sdl-image1.2 | 1.2.12-10+deb10u1 1.2.12-12 1.2.12-13 | |
SDL_image | =2.0.2 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-14441 is high with a score of 8.8.
The vulnerability in CVE-2017-14441 allows an attacker to execute code by exploiting an integer overflow and resulting heap overflow in the ICO image rendering functionality of SDL2_image-2.0.2.
The software versions affected by CVE-2017-14441 include libsdl2-image 2.0.2 and sdl-image1.2 1.2.12.
To fix CVE-2017-14441, update to the latest versions of libsdl2-image or sdl-image1.2 as specified in the Debian security advisories.
You can find more information about CVE-2017-14441 in the Debian security advisories and the Gentoo security advisory. Links are provided in the references section.