CVE-2018-3977

Published: 01 November 2018

An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image-2.0.3. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

From the Ubuntu security team

USN-4238-1 addressed serveral vulnerabilities in SDL_image. This update provides the corresponding fixes for Ubuntu 14.04 ESM.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
libsdl2-image
Launchpad, Ubuntu, Debian
Upstream
Released (2.0.3+dfsg1-3)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.0.4+dfsg1-2ubuntu2.16.04.1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.0.4+dfsg1-2ubuntu2.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.0.4+dfsg1-2ubuntu2.16.04.1)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(2.0.4+dfsg1-2ubuntu2.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

sdl-image1.2
Launchpad, Ubuntu, Debian
Upstream
Released (1.2.12-10)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.2.12-10)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.2.12-10)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.2.12-8ubuntu0.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.2.12-5+deb9u1ubuntu0.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr) Needed

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist