First published: Wed Jul 03 2019(Updated: )
An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libsdl Sdl2 Image | =2.0.4 | |
Debian Debian Linux | =8.0 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/libsdl2-image | 2.0.5+dfsg1-2 2.6.3+dfsg-1 2.8.4+dfsg-1 | |
debian/sdl-image1.2 | 1.2.12-12 1.2.12-13 1.2.12-14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5051 is an exploitable heap-based buffer overflow vulnerability that exists when loading a PCX file in SDL2_image, version 2.0.4.
An attacker can exploit CVE-2019-5051 by providing a specially crafted PCX image file to trigger the buffer overflow and potentially execute code.
CVE-2019-5051 has a severity rating of 8.8 (high).
SDL2_image version 2.0.4 is affected by CVE-2019-5051.
To fix CVE-2019-5051, upgrade to SDL2_image version 2.0.5+dfsg1-1 or higher.