In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup.
References
Link | Resource |
---|---|
http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html | Exploit Mailing List Third Party Advisory |
https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz | Product |
https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html | |
http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html | Exploit Mailing List Third Party Advisory |
https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz | Product |
https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html |
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html - Exploit, Mailing List, Third Party Advisory | |
References | () https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz - Product | |
References | () https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html - |
Information
Published : 2017-10-18 21:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15601
Mitre link : CVE-2017-15601
CVE.ORG link : CVE-2017-15601
JSON object : View
Products Affected
gnu
- libextractor
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer