Out-of-bounds Write Affecting sdl-image1.2 package, versions <1.2.12-12


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-SDLIMAGE12-5695656
  • published4 Aug 2019
  • disclosed31 Jul 2019

Introduced: 31 Jul 2019

CVE-2019-5060  (opens in a new tab)
CWE-787  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Debian:13 sdl-image1.2 to version 1.2.12-12 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sdl-image1.2 package and not the sdl-image1.2 package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

CVSS Scores

version 3.1