Description
Buffer overflow in the LWZReadByte function in IMG_gif.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, a similar issue to CVE-2006-4484. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Gynvael Coldwind · textdoslinux
https://www.exploit-db.com/exploits/31054
References (24)
Core 24
Core References
Exploit x_refsource_confirm
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/IMG_gif.c?r1=2970&r2=3462
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39865
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28869
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28850
Vendor Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00008.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28752
Issue Tracking x_refsource_confirm
https://issues.rpath.com/browse/RPL-2206
Vendor Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00039.html
Issue Tracking x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=207933
Patch x_refsource_confirm
http://www.libsdl.org/cgi/viewvc.cgi/trunk/SDL_image/CHANGES?revision=3462&view=markup
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29542
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2008/dsa-1493
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27417
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28640
Third Party Advisory x_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0061
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488079/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28830
Exploit mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=120110205511630&w=2
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200802-01.xml
Exploit x_refsource_misc
http://vexillium.org/?sec-sdlgif
Vendor Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-595-1
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0266
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:040
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28837
Scores
EPSS
0.2339
EPSS Percentile
96.0%
Details
CWE
CWE-119
Status
published
Products (1)
sdl/sdl_image
< 1.2.6
Published
Feb 01, 2008
Tracked Since
Feb 18, 2026