An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
The product does not handle or incorrectly handles an exceptional condition.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sdl2_image | Libsdl | 2.0.4 (including) | 2.0.4 (including) |
Libsdl2-image | Ubuntu | bionic | * |
Libsdl2-image | Ubuntu | cosmic | * |
Libsdl2-image | Ubuntu | disco | * |
Libsdl2-image | Ubuntu | esm-apps/bionic | * |
Libsdl2-image | Ubuntu | esm-apps/xenial | * |
Libsdl2-image | Ubuntu | trusty | * |
Libsdl2-image | Ubuntu | trusty/esm | * |
Libsdl2-image | Ubuntu | upstream | * |
Libsdl2-image | Ubuntu | xenial | * |
Sdl-image1.2 | Ubuntu | bionic | * |
Sdl-image1.2 | Ubuntu | cosmic | * |
Sdl-image1.2 | Ubuntu | disco | * |
Sdl-image1.2 | Ubuntu | trusty | * |
Sdl-image1.2 | Ubuntu | trusty/esm | * |
Sdl-image1.2 | Ubuntu | upstream | * |
Sdl-image1.2 | Ubuntu | xenial | * |