Vulnerability Description
An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libsdl | Sdl2 Image | 2.0.4 |
| Debian | Debian Linux | 8.0 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.0 |
| Canonical | Ubuntu Linux | 16.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/07/msg00026.htmlMailing ListThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820ExploitThird Party Advisory
- https://usn.ubuntu.com/4238-1/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/07/msg00026.htmlMailing ListThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820ExploitThird Party Advisory
- https://usn.ubuntu.com/4238-1/Third Party Advisory
FAQ
What is CVE-2019-5051?
CVE-2019-5051 is a vulnerability with a CVSS score of 8.8 (HIGH). An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution....
How severe is CVE-2019-5051?
CVE-2019-5051 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5051?
Check the references section above for vendor advisories and patch information. Affected products include: Libsdl Sdl2 Image, Debian Debian Linux, Opensuse Backports Sle, Opensuse Leap, Canonical Ubuntu Linux.