diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2008-05-02 19:56:07 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2008-05-02 19:56:07 +0000 |
commit | 16fb04f4439442d082e83446bd7219fcd13ba0a0 (patch) | |
tree | e49f4db19e326ee075de9b535f8998598a38f425 /security | |
parent | - Update to 0.99.6 (diff) |
- Document sdl_image - Buffer Overflow Vulnerabilities
Notes
Notes:
svn path=/head/; revision=212498
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7758e8cad76d..3d6bad0d44b2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b1bcab7d-1880-11dd-a914-0016179b2dd5"> + <topic>sdl_image -- buffer overflow vulnerabilities</topic> + <affects> + <package> + <name>sdl_image</name> + <range><lt>1.2.6_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/28640"> + <p>Two vulnerabilities have been reported in SDL_image, which can be + exploited by malicious people to cause a Denial of Service or potentially + compromise an application using the library.</p> + <p>A boundary error within the LWZReadByte() function in IMG_gif.c can + be exploited to trigger the overflow of a static buffer via a + specially crafted GIF file.</p> + <p>A boundary error within the "IMG_LoadLBM_RW()" function in IMG_lbm.c + can be exploited to cause a heap-based buffer overflow via a specially + crafted IFF ILBM file.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-6697</cvename> + <cvename>CVE-2008-0544</cvename> + <url>http://secunia.com/advisories/28640</url> + </references> + <dates> + <discovery>2008-01-24</discovery> + <entry>2008-05-02</entry> + </dates> + </vuln> + <vuln vid="30394651-13e1-11dd-bab7-0016179b2dd5"> <topic>gnupg -- memory corruption vulnerability</topic> <affects> |