10
CVSSv2

CVE-2008-5316

Published: 03/12/2008 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the ReadEmbeddedTextTag function in src/cmsio1.c in Little cms color engine (aka lcms) prior to 1.16 allows malicious users to have an unknown impact via vectors related to a length parameter inconsistency involving the contents of "the input file," a different vulnerability than CVE-2007-2741.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

littlecms lcms 1.08

littlecms lcms 1.07

littlecms lcms 1.10

littlecms lcms 1.09

littlecms little cms color engine 1.09

littlecms little cms color engine 1.08

littlecms lcms 1.14

littlecms lcms 1.13

littlecms little cms color engine 1.14

littlecms little cms color engine 1.13

littlecms little cms color engine 1.12

littlecms lcms

littlecms lcms 1.12

littlecms lcms 1.11

littlecms little cms color engine 1.11

littlecms little cms color engine 1.10

littlecms little cms color engine 1.07

littlecms little cms color engine

Vendor Advisories

Synopsis Moderate: lcms security update Type/Severity Security Advisory: Moderate Topic Updated lcms packages that resolve several security issues are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team Desc ...
Chris Evans discovered that certain ICC operations in lcms were not correctly bounds-checked If a user or automated system were tricked into processing an image with malicious ICC tags, a remote attacker could crash applications linked against liblcms1, leading to a denial of service, or possibly execute arbitrary code with user privileges ...
Two vulnerabilities have been found in lcms, a library and set of commandline utilities for image color management The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5316 Inadequate enforcement of fixed-length buffer limits allows an attacker to overflow a buffer on the stack, potentially enabling ...