First published: Wed Jul 31 2019(Updated: )
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
SDL2_image | =2.0.4 | |
openSUSE Backports | =15.0 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE | =15.0 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-5059.
The severity of CVE-2019-5059 is high (8.8).
CVE-2019-5059 affects Libsdl Sdl2 Image version 2.0.4.
Yes, patches and updates are available. Please refer to the provided references for more information.
The impact of CVE-2019-5059 is the potential for code execution through a heap overflow.