7.5
CVSSv2

CVE-2009-1364

Published: 01/05/2009 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.

Vulnerable Product Search on Vulmon Subscribe to Product

francis james franklin libwmf 0.2.8.4

opensuse opensuse 13.2

opensuse opensuse 13.1

Vendor Advisories

Synopsis Moderate: libwmf security update Type/Severity Security Advisory: Moderate Topic Updated libwmf packages that fix one security issue are now available forRed Hat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security Response Team Des ...
Debian Bug report logs - #526434 CVE-2009-1364 libwmf: embedded gd use-after-free error Package: libwmf; Maintainer for libwmf is Debian QA Group <packages@qadebianorg>; Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: Fri, 1 May 2009 08:21:04 UTC Severity: serious Tags: patch, security Found in versio ...
Tavis Ormandy discovered that libwmf incorrectly used memory after it had been freed when using its embedded GD library If a user or automated system were tricked into opening a crafted WMF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program ...
Tavis Ormandy discovered that the embedded GD library copy in libwmf, a library to parse windows metafiles (WMF), makes use of a pointer after it was already freed An attacker using a crafted WMF file can cause a denial of service or possibly the execute arbitrary code via applications using this library For the oldstable distribution (etch), thi ...
Use-after-free vulnerability in the embedded GD library in libwmf 0284 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file ...

Github Repositories

# MEM30-C Do not access freed memory Evaluating a pointer—including dereferencing the pointer, using it as an operand of an arithmetic operation, type casting it, and using it as the right-hand side of an assignment—into memory that has been deallocated by a memory management function is undefined behavior Pointers to memory that has been deallocated are called d

References