CVE-2009-2295
Published: 5 July 2009
Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.
Priority
Status
Package | Release | Status |
---|---|---|
advi Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Released
(1.6.0-13ubuntu0.1)
|
|
intrepid |
Ignored
(end of life, was needs-triage)
|
|
jaunty |
Released
(1.6.0-13+lenny2build0.9.04.1)
|
|
karmic |
Released
(1.6.0-14ubuntu0.1)
|
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
upstream |
Released
(1.6.0-15)
|
|
camlimages Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Released
(1:2.2.0-2ubuntu2.1)
|
|
intrepid |
Released
(1:2.2.0-3ubuntu0.1)
|
|
jaunty |
Released
(1:2.2.0-4+lenny2build0.9.04.1)
|
|
karmic |
Not vulnerable
|
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
upstream |
Released
(1:3.0.1-3)
|