6.8
CVSSv2

CVE-2017-5333

Published: 04/11/2019 Updated: 07/11/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils prior to 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

icoutils project icoutils

redhat enterprise linux server eus 7.7

redhat enterprise linux server eus 7.4

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.6

redhat enterprise linux server tus 7.3

redhat enterprise linux server tus 7.7

redhat enterprise linux workstation 7.0

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.6

redhat enterprise linux 7.0

redhat enterprise linux server eus 7.3

redhat enterprise linux server eus 7.5

redhat enterprise linux server tus 7.6

redhat enterprise linux server aus 7.7

canonical ubuntu linux 12.04

debian debian linux 9.0

debian debian linux 8.0

debian debian linux 10.0

opensuse leap 42.1

opensuse leap 42.2

opensuse opensuse 13.2

Vendor Advisories

Synopsis Important: icoutils security update Type/Severity Security Advisory: Important Topic An update for icoutils is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base scor ...
icoutils could be made to crash or run programs as your login if it opened a specially crafted file ...
Several programming errors in the wrestool tool of icoutils, a suite of tools to create and extract MS Windows icons and cursors, allow denial of service or the execution of arbitrary code if a malformed binary is parsed For the stable distribution (jessie), these problems have been fixed in version 0310-2+deb8u2 For the testing distribution (s ...