Description
Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.
Published: 2009-07-05
Score: 7.5 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1832-1 New camlimages packages fix arbitrary code execution
EUVD EUVD EUVD-2009-2291 Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.
History

No history.

Subscriptions

Jun Furuse Camlimages
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T05:44:55.933Z

Reserved: 2009-07-02T00:00:00.000Z

Link: CVE-2009-2295

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-07-05T16:30:00.420

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-2295

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses