CVE-2019-5052

Name
CVE-2019-5052
Description
An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821
MLIST https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html
MLIST https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
UBUNTU https://usn.ubuntu.com/4238-1/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libsdl:sdl2_image:2.0.4:*:*:*:*:*:*:* sdl2_image == None == 2.0.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
sdl2_image 3.10-main 2.0.5-r0 Francesco Colista <fcolista@alpinelinux.org> fixed