In wallpaper.c in feh before v2.18.3, if a malicious client pretends to be the E17 window manager, it is possible to trigger an out-of-boundary heap write while receiving an IPC message. An integer overflow leads to a buffer overflow and/or a double free.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97689 | Third Party Advisory VDB Entry |
https://feh.finalrewind.org/ | Patch Product |
https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/05/msg00021.html | |
https://security.gentoo.org/glsa/201707-08 | |
http://www.securityfocus.com/bid/97689 | Third Party Advisory VDB Entry |
https://feh.finalrewind.org/ | Patch Product |
https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/05/msg00021.html | |
https://security.gentoo.org/glsa/201707-08 |
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97689 - Third Party Advisory, VDB Entry | |
References | () https://feh.finalrewind.org/ - Patch, Product | |
References | () https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/05/msg00021.html - | |
References | () https://security.gentoo.org/glsa/201707-08 - |
Information
Published : 2017-04-14 18:59
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7875
Mitre link : CVE-2017-7875
CVE.ORG link : CVE-2017-7875
JSON object : View
Products Affected
feh_project
- feh
CWE
CWE-787
Out-of-bounds Write