First published: Wed Jul 03 2019(Updated: )
An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libsdl Sdl2 Image | =2.0.4 | |
Debian Debian Linux | =8.0 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/libsdl2-image | 2.0.5+dfsg1-2 2.6.3+dfsg-1 2.8.4+dfsg-1 | |
debian/sdl-image1.2 | 1.2.12-12 1.2.12-13 1.2.12-14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5052 is an exploitable integer overflow vulnerability in SDL2_image 2.0.4.
CVE-2019-5052 affects SDL2_image version 2.0.4.
CVE-2019-5052 has a severity rating of 8.8 (High).
To fix CVE-2019-5052 in SDL2_image 2.0.4, you should update to a version that includes the fix, such as 2.0.5+dfsg1-2 or later.
You can find more information about CVE-2019-5052 at the following references: [Reference 1](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821), [Reference 2](https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html), [Reference 3](https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html).