First published: Fri Sep 22 2017(Updated: )
Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
sam2p | =0.49.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14636 is considered a high severity vulnerability due to the potential for memory corruption.
To fix CVE-2017-14636, upgrade to a version of sam2p later than 0.49.3 that addresses this integer overflow issue.
CVE-2017-14636 can be exploited in scenarios where specially crafted input results in an integer overflow and memory corruption.
CVE-2017-14636 specifically affects version 0.49.3 of sam2p; earlier versions may also be susceptible but have not been reported.
Exploitation of CVE-2017-14636 may lead to application crashes or unexpected behavior due to invalid memory access.