CVE-2017-17833 – openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution
https://notcve.org/view.php?id=CVE-2017-17833
OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability. Las versiones de OpenSLP en las secuencias de código 1.0.2 y 1.1.0 tienen un problema de corrupción de memoria relacionada con la memoria dinámica (heap), que puede manifestarse como una vulnerabilidad de denegación de servicio (DoS) o de ejecución remota de código. A use-after-free flaw in OpenSLP 1.x and 2.x baselines was discovered in the ProcessSrvRqst function. A failure to update a local pointer may lead to heap corruption. A remote attacker may be able to leverage this flaw to gain remote code execution. • http://support.lenovo.com/us/en/solutions/LEN-18247 https://access.redhat.com/errata/RHSA-2018:2240 https://access.redhat.com/errata/RHSA-2018:2308 https://lists.debian.org/debian-lts-announce/2018/04/msg00029.html https://security.gentoo.org/glsa/202005-12 https://sourceforge.net/p/openslp/mercurial/ci/151f07745901cbdba6e00e4889561b4083250da1 https://usn.ubuntu.com/3708-1 https://access.redhat.com/security/cve/CVE-2017-17833 https://bugzilla.redhat.com/show_bug.cgi?id=1572166 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-416: Use After Free •
CVE-2017-14440
https://notcve.org/view.php?id=CVE-2017-14440
An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a stack overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. Existe una vulnerabilidad explotable de ejecución de código en la funcionalidad de renderización de imágenes ILBM de SDL2_image-2.0.2. Un paquete de red especialmente manipulado puede provocar un desbordamiento de pila que resulta en la ejecución de código. • https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html https://security.gentoo.org/glsa/201903-17 https://www.debian.org/security/2018/dsa-4177 https://www.debian.org/security/2018/dsa-4184 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0489 • CWE-787: Out-of-bounds Write •
CVE-2017-12122
https://notcve.org/view.php?id=CVE-2017-12122
An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. Existe una vulnerabilidad explotable de ejecución de código en la funcionalidad de renderización de imágenes ILBM de SDL2_image-2.0.2. Una imagen ILBM especialmente manipulada puede provocar un desbordamiento de memoria dinámica (heap) que daría lugar a la ejecución de código. • https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html https://security.gentoo.org/glsa/201903-17 https://www.debian.org/security/2018/dsa-4177 https://www.debian.org/security/2018/dsa-4184 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0488 • CWE-787: Out-of-bounds Write •
CVE-2017-14441
https://notcve.org/view.php?id=CVE-2017-14441
An exploitable code execution vulnerability exists in the ICO image rendering functionality of SDL2_image-2.0.2. A specially crafted ICO image can cause an integer overflow, cascading to a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. Existe una vulnerabilidad explotable de ejecución de código en la funcionalidad de renderización de imágenes ICO de SDL2_image-2.0.2. Una imagen ICO especialmente manipulada puede provocar un desbordamiento de enteros y un desbordamiento de memoria dinámica (heap) que daría lugar a la ejecución de código. • https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html https://security.gentoo.org/glsa/201903-17 https://www.debian.org/security/2018/dsa-4177 https://www.debian.org/security/2018/dsa-4184 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0490 • CWE-190: Integer Overflow or Wraparound •
CVE-2017-14450
https://notcve.org/view.php?id=CVE-2017-14450
A buffer overflow vulnerability exists in the GIF image parsing functionality of SDL2_image-2.0.2. A specially crafted GIF image can lead to a buffer overflow on a global section. An attacker can display an image to trigger this vulnerability. Existe una vulnerabilidad de desbordamiento de búfer en la funcionalidad de renderización de imágenes GIF de SDL2_image-2.0.2. Una imagen GIF especialmente manipulada puede desembocar en un desbordamiento de búfer en una sección global. • https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html https://security.gentoo.org/glsa/201903-17 https://www.debian.org/security/2018/dsa-4177 https://www.debian.org/security/2018/dsa-4184 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0499 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •