SB2017083107 - Remote code execution in GNOME GdkPixbuf



SB2017083107 - Remote code execution in GNOME GdkPixbuf

Published: August 31, 2017

Security Bulletin ID SB2017083107
Severity
High
Patch available
NO
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2017-2870)

The vulnerability allows a remote attacker to execute arbitrary code on the targeted system.

The weakness exists in the tiffimageparse functionality due to integer overflow. A remote attacker can trick the victim to click a malicious link or open a specially crafted TIFF file, trigger heap-based buffer overflow and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

2) Integer overflow (CVE-ID: CVE-2017-2862)

The vulnerability allows a remote attacker to execute arbitrary code on the targeted system.

The weakness exists in the gdk_pixbuf__jpeg_image_load_increment function due to heap-based buffer overflow. A remote attacker can trick the victim to click a malicious link or open a specially crafted JPEG file, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.