SB2017012910 - Gentoo update for FreeImage



SB2017012910 - Gentoo update for FreeImage

Published: January 29, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017012910
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer underflow (CVE-ID: CVE-2015-0852)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer underflow in PluginPCX.cpp. A remote attacker can trigger an integer underflow and crash the application.


2) Arbitrary code execution (CVE-ID: CVE-2016-5684)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness exists due to buffer overflow caused by processing of malformed XMP or RAW image and allowing attackers to execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Remediation

Install update from vendor's website.