SB2018010529 - Multiple vulnerabilities in ImageWorsener



SB2018010529 - Multiple vulnerabilities in ImageWorsener

Published: January 5, 2018 Updated: August 8, 2020

Security Bulletin ID SB2018010529
Severity
High
Patch available
NO
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2017-12804)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The iwgif_init_screen function in imagew-gif.c:510 in ImageWorsener 1.3.2 allows remote attackers to cause a denial of service (hmemory exhaustion) via a crafted file.


2) Buffer overflow (CVE-ID: CVE-2018-16782)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary. A remote attacker can create a specially crafted file, trick the victim into opening it with the affected software, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Input validation error (CVE-ID: CVE-2018-5252)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

libimageworsener.a in ImageWorsener 1.3.2, when libjpeg 8d is used, has a large loop in the get_raw_sample_int function in imagew-main.c.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.