First published: Wed Jun 26 2019(Updated: )
Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libming Libming | =0.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the fill overflow vulnerability in Ming (aka libming) 0.4.8 is CVE-2019-12981.
The severity rating of the fill overflow vulnerability in Ming (aka libming) 0.4.8 is 8.8 (high).
The fill overflow vulnerability in Ming (aka libming) 0.4.8 occurs in the function SWFShape_setLeftFillStyle in blocks/shape.c.
Ming (aka libming) 0.4.8 is the version affected by the fill overflow vulnerability.
Yes, a fix for the fill overflow vulnerability in Ming (aka libming) 0.4.8 is available. Please refer to the following reference for more information: [GitHub Commit](https://github.com/libming/libming/commit/6e76e8c71cb51c8ba0aa9737a636b9ac3029887f)