imlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to several heap and stack based buffer overflows - partly due to integer overflows.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Imlib2 | Enlightenment | * | 1.4.1 (including) |
Imlib2 | Enlightenment | 1.0 (including) | 1.0 (including) |
Imlib2 | Enlightenment | 1.0.1 (including) | 1.0.1 (including) |
Imlib2 | Enlightenment | 1.0.2 (including) | 1.0.2 (including) |
Imlib2 | Enlightenment | 1.0.3 (including) | 1.0.3 (including) |
Imlib2 | Enlightenment | 1.0.4 (including) | 1.0.4 (including) |
Imlib2 | Enlightenment | 1.0.5 (including) | 1.0.5 (including) |
Imlib2 | Enlightenment | 1.1 (including) | 1.1 (including) |
Imlib2 | Enlightenment | 1.1.1 (including) | 1.1.1 (including) |
Imlib2 | Enlightenment | 1.1.2 (including) | 1.1.2 (including) |
Imlib2 | Enlightenment | 1.2.1 (including) | 1.2.1 (including) |
Imlib2 | Enlightenment | 1.2.2 (including) | 1.2.2 (including) |
Imlib2 | Enlightenment | 1.3.0 (including) | 1.3.0 (including) |
Imlib2 | Enlightenment | 1.4.0 (including) | 1.4.0 (including) |
Imlib2 | Ubuntu | dapper | * |
Imlib2 | Ubuntu | gutsy | * |
Imlib2 | Ubuntu | hardy | * |
Imlib2 | Ubuntu | intrepid | * |
Imlib2 | Ubuntu | upstream | * |