First published: Wed Oct 11 2017(Updated: )
An exploitable integer overflow vulnerability exists when creating a new RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer overflow resulting in too little memory being allocated which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libsdl Simple Directmedia Layer | =2.0.5 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Debian Debian Linux | =9.0 | |
debian/libsdl1.2 | 1.2.15+dfsg2-6 1.2.15+dfsg2-8 | |
debian/libsdl2 | 2.0.14+dfsg2-3+deb11u1 2.26.5+dfsg-1 2.30.11+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-2888.
The severity of CVE-2017-2888 is high with a CVSS score of 8.8.
The vulnerability occurs due to an integer overflow when creating a new RGB Surface in SDL 2.0.5.
The vulnerability can lead to a buffer overflow and potential code execution.
SDL 2.0.5 is affected by this vulnerability.