Out-of-Bounds

Affecting gdk-pixbuf package, versions <2.36.5-2+deb9u1

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.

References

CVSS Score

7.8
high severity
  • Attack Vector
    Local
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE
CVE-2017-2862
CWE
CWE-119
Snyk ID
SNYK-DEBIAN9-GDKPIXBUF-344992
Disclosed
05 Sep, 2017
Published
05 Sep, 2017