First published: Tue Apr 24 2018(Updated: )
An exploitable code execution vulnerability exists in the BMP image rendering functionality of SDL2_image-2.0.2. A specially crafted BMP image can cause a stack overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libsdl2-image | 2.0.4+dfsg1-1+deb10u1 2.0.5+dfsg1-2 2.6.3+dfsg-1 2.6.3+dfsg-2 | |
debian/sdl-image1.2 | 1.2.12-10+deb10u1 1.2.12-12 1.2.12-13 | |
Libsdl Sdl Image | =2.0.2 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14442 is a code execution vulnerability in the BMP image rendering functionality of SDL2_image-2.0.2.
This vulnerability can be triggered by a specially crafted BMP image, causing a stack overflow and leading to code execution.
CVE-2017-14442 has a severity value of 8.8, indicating a high severity.
To fix CVE-2017-14442, update to one of the following versions: libsdl2-image 2.0.4+dfsg1-1+deb10u1, 2.0.5+dfsg1-2, 2.6.3+dfsg-1, or 2.6.3+dfsg-2.
You can find more information about CVE-2017-14442 at the following references: [1](https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html), [2](https://security.gentoo.org/glsa/201903-17), [3](https://www.debian.org/security/2018/dsa-4177).