CVE-2017-2888

Published: 11 October 2017

An exploitable integer overflow vulnerability exists when creating a new RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer overflow resulting in too little memory being allocated which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

From the Ubuntu security team

USN-4143-1 addressed serveral vulnerabilities in SDL 2.0. This update provides the corresponding fixes for Ubuntu 14.04 ESM.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
libsdl1.2
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.0.6+dfsg1-2ubuntu2)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(2.0.4+dfsg1-2ubuntu2)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(2.0.2+dfsg1-3ubuntu1.2)
libsdl2
Launchpad, Ubuntu, Debian
Upstream
Released (2.0.6+dfsg1-4)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.0.8+dfsg1-1ubuntu1.18.04.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.0.4+dfsg1-2ubuntu2.16.04.2)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.0.2+dfsg1-3ubuntu1.3)
Patches:
Upstream: https://hg.libsdl.org/SDL/rev/7e0f1498ddb5