Vulnerability Description
libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/49259
- https://www.gegl.org
- https://www.gegl.org/babl/
- https://www.vulncheck.com/advisories/libbabl-broken-double-free-detection-memory
FAQ
What is CVE-2020-37239?
CVE-2020-37239 is a vulnerability with a CVSS score of 9.8 (CRITICAL). libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_f...
How severe is CVE-2020-37239?
CVE-2020-37239 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-37239?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.