CVE-2017-5333

Published: 11 January 2017

Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
icoutils
Launchpad, Ubuntu, Debian
Upstream
Released (0.31.1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.31.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.31.1-1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (0.31.0-3ubuntu0.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [0.31.0-2+deb8u2build0.14.04.1])
Patches:
Upstream: http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a

Notes

AuthorNote
mdeslaur
This CVE is for "the separate vulnerability fixed by the
introduction of the "size >= sizeof(uint16_t)*2" test in
1a108713ac26215c7568353f6e02e727e6d4b24a"

References