Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2007-6697

Published: 1 February 2008

Buffer overflow in the LWZReadByte function in IMG_gif.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, a similar issue to CVE-2006-4484. NOTE: some of these details are obtained from third party information.

Priority

Medium

Status

Package Release Status
sdl-image1.2
Launchpad, Ubuntu, Debian
artful Not vulnerable

bionic Not vulnerable

cosmic Not vulnerable

dapper
Released (1.2.4-1ubuntu0.1)
edgy
Released (1.2.5-2ubuntu0.6.10.1)
feisty
Released (1.2.5-2ubuntu0.7.04.1)
gutsy
Released (1.2.5-3ubuntu0.1)
hardy
Released (1.2.6-3)
lucid Not vulnerable

maverick Not vulnerable

natty Not vulnerable

oneiric Not vulnerable

precise Does not exist
(precise was not-affected)
quantal Not vulnerable

raring Not vulnerable

saucy Not vulnerable

trusty Not vulnerable

upstream
Released (1.2.7)
utopic Not vulnerable

vivid Not vulnerable

wily Not vulnerable

xenial Not vulnerable

yakkety Not vulnerable

zesty Not vulnerable

Patches:
vendor: http://www.debian.org/security/2008/dsa-1493
debdiff: https://bugs.launchpad.net/ubuntu/+source/sdl-image1.2/+bug/185782

swi-prolog
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable

cosmic Not vulnerable

hardy Ignored
(reached end-of-life)
lucid Ignored
(reached end-of-life)
maverick Ignored
(reached end-of-life)
natty Ignored
(reached end-of-life)
oneiric Ignored
(reached end-of-life)
precise Does not exist
(precise was needed)
quantal Ignored
(reached end-of-life)
raring Ignored
(reached end-of-life)
saucy Ignored
(reached end-of-life)
trusty Does not exist
(trusty was not-affected)
upstream
Released
utopic Ignored
(reached end-of-life)
vivid Ignored
(reached end-of-life)
wily Ignored
(reached end-of-life)
xenial Not vulnerable

yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)
Patches:


upstream: http://www.swi-prolog.org/git/packages/xpce.git/commit/785efb7b94d28c7dbb5b4f2b6f5a908092cf7652