diff options
author | miwi <miwi@FreeBSD.org> | 2008-05-03 03:56:07 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2008-05-03 03:56:07 +0800 |
commit | 534a9c5b73fe5608a00d2c6a1e46fc6962e20ce5 (patch) | |
tree | 4c04ff2d15643af966b3a2ad946454a713985374 | |
parent | fd387d124543b39fa5878203190eb7d33a378689 (diff) | |
download | freebsd-ports-gnome-534a9c5b73fe5608a00d2c6a1e46fc6962e20ce5.tar.gz freebsd-ports-gnome-534a9c5b73fe5608a00d2c6a1e46fc6962e20ce5.tar.zst freebsd-ports-gnome-534a9c5b73fe5608a00d2c6a1e46fc6962e20ce5.zip |
- Document sdl_image - Buffer Overflow Vulnerabilities
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7758e8cad76d..3d6bad0d44b2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b1bcab7d-1880-11dd-a914-0016179b2dd5"> + <topic>sdl_image -- buffer overflow vulnerabilities</topic> + <affects> + <package> + <name>sdl_image</name> + <range><lt>1.2.6_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/28640"> + <p>Two vulnerabilities have been reported in SDL_image, which can be + exploited by malicious people to cause a Denial of Service or potentially + compromise an application using the library.</p> + <p>A boundary error within the LWZReadByte() function in IMG_gif.c can + be exploited to trigger the overflow of a static buffer via a + specially crafted GIF file.</p> + <p>A boundary error within the "IMG_LoadLBM_RW()" function in IMG_lbm.c + can be exploited to cause a heap-based buffer overflow via a specially + crafted IFF ILBM file.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-6697</cvename> + <cvename>CVE-2008-0544</cvename> + <url>http://secunia.com/advisories/28640</url> + </references> + <dates> + <discovery>2008-01-24</discovery> + <entry>2008-05-02</entry> + </dates> + </vuln> + <vuln vid="30394651-13e1-11dd-bab7-0016179b2dd5"> <topic>gnupg -- memory corruption vulnerability</topic> <affects> |