Description
Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.
Published: 2017-09-22
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1127-1 sam2p security update
EUVD EUVD EUVD-2017-6136 Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.
References
History

No history.

Subscriptions

Sam2p Project Sam2p
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T19:34:39.551Z

Reserved: 2017-09-21T00:00:00.000Z

Link: CVE-2017-14636

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-09-22T07:29:00.207

Modified: 2026-05-13T00:24:29.033

Link: CVE-2017-14636

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses