CVE-2017-16663

Publication date 8 November 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.5 · Medium

Score breakdown

In sam2p 0.49.4, there are integer overflows (with resultant heap-based buffer overflows) in input-bmp.ci in the function ReadImage, because “width * height” multiplications occur unsafely.

From the Ubuntu Security Team

It was discovered that Sam2p incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

Status

Package Ubuntu Release Status
sam2p 18.04 LTS bionic Not in release
17.10 artful Not in release
17.04 zesty Not in release
16.04 LTS xenial
Fixed 0.49.2-3+deb8u3build0.16.04.1
14.04 LTS trusty
Fixed 0.49.2-3+deb8u3build0.14.04.1

Severity score breakdown

Parameter Value
Base score 5.5 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H