First published: Fri Mar 10 2017(Updated: )
Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME gdk-pixbuf | <2.36.12 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =8.0 | |
debian/gdk-pixbuf | 2.42.2+dfsg-1+deb11u2 2.42.2+dfsg-1+deb11u1 2.42.10+dfsg-1+deb12u1 2.42.12+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2017-6313.
The severity of CVE-2017-6313 is high.
The affected software is gdk-pixbuf.
This vulnerability can be exploited by context-dependent attackers through a crafted image entry size in an ICO file, leading to a denial of service.
Yes, there are fixes available for this vulnerability. For example, the remedy versions for the Ubuntu package gdk-pixbuf are 2.36.11-1ubuntu0.1, 2.30.7-0ubuntu1.8, 2.36.11-2, and 2.32.2-1ubuntu1.4.