CVE-2022-48622

In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
References
Link Resource
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*

History

02 Feb 2024, 15:53

Type Values Removed Values Added
CWE CWE-787
First Time Gnome gdkpixbuf
Gnome
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 - () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 - Exploit, Issue Tracking
CPE cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*

26 Jan 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-26 09:15

Updated : 2024-08-26 20:35


NVD link : CVE-2022-48622

Mitre link : CVE-2022-48622

CVE.ORG link : CVE-2022-48622


JSON object : View

Products Affected

gnome

  • gdkpixbuf
CWE
CWE-787

Out-of-bounds Write