6.8
CVSSv2

CVE-2015-4491

Published: 16/08/2015 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf prior to 2.31.5, as used in Mozilla Firefox prior to 40.0 and Firefox ESR 38.x prior to 38.2 on Linux, Google Chrome on Linux, and other products, allows remote malicious users to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome gdk-pixbuf

oracle solaris 10

oracle solaris 11.3

opensuse opensuse 13.1

opensuse opensuse 13.2

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

fedoraproject fedora 21

fedoraproject fedora 22

Vendor Advisories

Gustavo Grieco discovered a heap overflow in the processing of BMP images which may result in the execution of arbitrary code if a malformed image is opened For the oldstable distribution (wheezy), this problem has been fixed in version 2261-1+deb7u3 For the stable distribution (jessie), this problem has been fixed in version 2311-2+deb8u4 F ...
This update provides compatible packages for Firefox 40 ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2702-1 introduced a regression in Firefox ...
Several security issues were fixed in Thunderbird ...
GDK-PixBuf could be made to crash or run programs as your login if it opened a specially crafted file ...
Mozilla Foundation Security Advisory 2015-88 Heap overflow in gdk-pixbuf when scaling bitmap images Announced August 11, 2015 Reporter Gustavo Grieco Impact High Products Firefox, Firefox ESR, SeaMonkey, Thunderbird Fix ...

References

CWE-189http://www.mozilla.org/security/announce/2015/mfsa2015-88.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=1184009https://bugzilla.redhat.com/show_bug.cgi?id=1252290https://bugzilla.gnome.org/show_bug.cgi?id=752297https://git.gnome.org/browse/gdk-pixbuf/commit/?id=ffec86ed5010c5a2be14f47b33bcf4ed3169a199http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.htmlhttp://www.ubuntu.com/usn/USN-2702-2http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.htmlhttp://www.ubuntu.com/usn/USN-2702-1http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165701.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-September/165730.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlhttps://security.gentoo.org/glsa/201605-06http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlhttps://security.gentoo.org/glsa/201512-05http://www.securitytracker.com/id/1033372http://rhn.redhat.com/errata/RHSA-2015-1694.htmlhttp://lists.opensuse.org/opensuse-updates/2015-09/msg00002.htmlhttp://lists.opensuse.org/opensuse-updates/2015-08/msg00031.htmlhttp://lists.opensuse.org/opensuse-updates/2015-08/msg00030.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-September/165732.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-September/165703.htmlhttp://www.ubuntu.com/usn/USN-2722-1http://www.ubuntu.com/usn/USN-2712-1http://www.ubuntu.com/usn/USN-2702-3http://www.securitytracker.com/id/1033247http://www.debian.org/security/2015/dsa-3337http://rhn.redhat.com/errata/RHSA-2015-1682.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1586.htmlhttps://nvd.nist.govhttps://www.debian.org/security/./dsa-3337https://usn.ubuntu.com/2702-2/