Description
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-14666 | An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-04T19:47:55.936Z
Reserved: 2019-01-04T00:00:00.000Z
Link: CVE-2019-5059
No data.
Status : Modified
Published: 2019-07-31T17:15:11.730
Modified: 2024-11-21T04:44:16.107
Link: CVE-2019-5059
No data.
OpenCVE Enrichment
No data.
EUVD