SB2017083107 - Remote code execution in GNOME GdkPixbuf
Published: August 31, 2017
Security Bulletin ID
SB2017083107
Severity
High
Patch available
NO
Number of vulnerabilities
2
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2017-2870)
The vulnerability allows a remote attacker to execute arbitrary code on the targeted system.The weakness exists in the tiffimageparse functionality due to integer overflow. A remote attacker can trick the victim to click a malicious link or open a specially crafted TIFF file, trigger heap-based buffer overflow and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Integer overflow (CVE-ID: CVE-2017-2862)
The vulnerability allows a remote attacker to execute arbitrary code on the targeted system.The weakness exists in the gdk_pixbuf__jpeg_image_load_increment function due to heap-based buffer overflow. A remote attacker can trick the victim to click a malicious link or open a specially crafted JPEG file, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.