CVE-2012-2370
Published: 13 August 2012
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
Notes
Author | Note |
---|---|
sbeattie | according to Kees in LP bug, can only cause DoS |
Priority
Status
Package | Release | Status |
---|---|---|
gdk-pixbuf Launchpad, Ubuntu, Debian |
hardy |
Ignored
(reached end-of-life)
|
lucid |
Does not exist
|
|
natty |
Ignored
(reached end-of-life)
|
|
oneiric |
Ignored
(reached end-of-life)
|
|
precise |
Not vulnerable
(2.26.1-1)
|
|
quantal |
Not vulnerable
(2.26.1-1)
|
|
raring |
Not vulnerable
(2.26.1-1)
|
|
upstream |
Released
(2.26.1)
|
|
Patches: upstream: http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22 |