First published: Fri Feb 09 2024(Updated: )
An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enlightenment Imlib2 | =1.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25447 has a high severity due to the potential for heap buffer overflow which can be exploited by attackers.
To fix CVE-2024-25447, upgrade to a patched version of imlib2 that addresses the heap buffer overflow vulnerability.
CVE-2024-25447 allows attackers to perform a heap buffer overflow, which can lead to remote code execution or application crashes.
Users of imlib2 version 1.9.1 are impacted by CVE-2024-25447 and should take immediate action to mitigate the vulnerability.
Yes, CVE-2024-25447 can be exploited remotely by passing a crafted image to the affected imlib2 library.