In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
References
Link | Resource |
---|---|
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 | Exploit Issue Tracking |
Configurations
History
02 Feb 2024, 15:53
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Gnome gdkpixbuf
Gnome |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 - Exploit, Issue Tracking | |
CPE | cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:* |
26 Jan 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-26 09:15
Updated : 2024-08-26 20:35
NVD link : CVE-2022-48622
Mitre link : CVE-2022-48622
CVE.ORG link : CVE-2022-48622
JSON object : View
Products Affected
gnome
- gdkpixbuf
CWE
CWE-787
Out-of-bounds Write