CVE-2017-2862 – gdk-pixbuf2: Heap overflow in the gdk_pixbuf__jpeg_image_load_increment function
https://notcve.org/view.php?id=CVE-2017-2862
An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability. Existe una vulnerabilidad explotable de desbordamiento de montículos en la funcionalidad gdk_pixbuf__jpeg_image_load_increment de Gdk-Pixbuf 2.36.6. Un archivo jpeg especialmente manipulado puede provocar un desbordamiento de montículos que daría lugar a la ejecución remota de código. • http://www.debian.org/security/2017/dsa-3978 http://www.securityfocus.com/bid/100541 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0366 https://access.redhat.com/security/cve/CVE-2017-2862 https://bugzilla.redhat.com/show_bug.cgi?id=1488817 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •
CVE-2017-6311
https://notcve.org/view.php?id=CVE-2017-6311
gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to printing an error message. gdk-pixbuf-thumbnailer.c en gdk-pixbuf permite a atacantes dependientes de contexto provocar una denegación de servicio (referencia a puntero NULL y caída de aplicación) a través de vectores relacionados con la impresión de un mensaje de error. • http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html http://www.openwall.com/lists/oss-security/2017/02/21/4 http://www.openwall.com/lists/oss-security/2017/02/26/1 http://www.securityfocus.com/bid/96779 https://bugzilla.gnome.org/show_bug.cgi?id=778204 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLA • CWE-476: NULL Pointer Dereference •
CVE-2017-6312
https://notcve.org/view.php?id=CVE-2017-6312
Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations. Desbordamiento de entero in io-ico.c in gdk-pixbuf permite a atacantes dependientes de contexto provocar una denegación de servicio (fallo de segmentación y caída de aplicación) a través del desplazamiento de entrada de una imagen manipulada en un archivo ICO, lo que desencadena una lectura fuera de límites, relacionado con optimizaciones del compilador. • http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html http://www.openwall.com/lists/oss-security/2017/02/21/4 http://www.openwall.com/lists/oss-security/2017/02/26/1 http://www.securityfocus.com/bid/96779 https://bugzilla.gnome.org/show_bug.cgi?id=779012 https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2 https://lists.fedoraproject.org/arch • CWE-190: Integer Overflow or Wraparound •
CVE-2017-6313
https://notcve.org/view.php?id=CVE-2017-6313
Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file. Desbordamiento inferior de entero en la función load_resources en io-icns.c en gdk-pixbuf permite a atacantes dependientes de contexto provocar una denegación de servicio (lectura fuera de límites y caída del programa) a través de una entrada de tamaño de imagen manipulada en un archivo ICO. • http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html http://www.openwall.com/lists/oss-security/2017/02/21/4 http://www.openwall.com/lists/oss-security/2017/02/26/1 http://www.securityfocus.com/bid/96779 https://bugzilla.gnome.org/show_bug.cgi?id=779016 https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2 https://lists.fedoraproject.org/arch • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2017-6314
https://notcve.org/view.php?id=CVE-2017-6314
The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file. La función make_available_at_least en io-tiff.c en gdk-pixbuf permite a atacantes dependientes de contexto provocar una denegación de servicio (bucle infinito) a través de un archivo TIFF grande. • http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html http://www.openwall.com/lists/oss-security/2017/02/21/4 http://www.openwall.com/lists/oss-security/2017/02/26/1 http://www.securityfocus.com/bid/96779 https://bugzilla.gnome.org/show_bug.cgi?id=779020 https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2 https://lists.fedoraproject.org/arch • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •