An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Sdl2 Image Subscribe
Opensuse Subscribe
Backports Sle Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1861-1 libsdl2-image security update
Debian DLA Debian DLA DLA-1865-1 sdl-image1.2 security update
EUVD EUVD EUVD-2019-14659 An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
Ubuntu USN Ubuntu USN USN-4238-1 SDL_image vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-04T19:47:55.665Z

Reserved: 2019-01-04T00:00:00

Link: CVE-2019-5052

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-03T19:15:12.707

Modified: 2024-11-21T04:44:15.323

Link: CVE-2019-5052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses