Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2013-4276 |
CWE-ID | CWE-121 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
linux-firmware (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU32034
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2013-4276
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionslinux-firmware (Alpine package): All versions
CPE2.3 External linkshttps://git.alpinelinux.org/aports/commit/?id=6f56b82cbb3d74747286de59ba96e6a2e36bbebf
https://git.alpinelinux.org/aports/commit/?id=3975ed6c4f27b2e8e3396d26277ee54928f7a657
https://git.alpinelinux.org/aports/commit/?id=d2bfb22c8e8f67ad7d8d02704f35ec4d2a19f9b9
https://git.alpinelinux.org/aports/commit/?id=3714e669c9b3dad8b85d2d148c2ee414d466eb4d
https://git.alpinelinux.org/aports/commit/?id=ab4fb8ed3e22f13d0c7b235ba46527f148ab9b92
https://git.alpinelinux.org/aports/commit/?id=2b610e740af36c298240910e010b29396f4b8f23
https://git.alpinelinux.org/aports/commit/?id=53007a56c6b64c60c3b1e9f4b3f106fe7a9a18e5
https://git.alpinelinux.org/aports/commit/?id=54ea48c2d606ad7dc278b7c9f6e72cf4b11ed9ca
https://git.alpinelinux.org/aports/commit/?id=921298d100ce1bee3a8d45a5aefb2b210d559c64
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.