CVE-2019-5052 PUBLISHED

An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

EPSS 1.42% · 80.5th percentile

Risk Scores

EPSS Score
1.42%
80.5th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSsdl-image1.20, 1.2.12-6, 1.2.12-7
Ubuntu:Pro:14.04:LTSsdl-image1.21.2.12-5, 0, 1.2.12-4ubuntu1
Ubuntu:18.04:LTSlibsdl2-image2.0.2+dfsg1-1, 0, 2.0.1+dfsg-3
Ubuntu:16.04:LTSlibsdl2-image0, 2.0.0+dfsg-3build2, 2.0.1+dfsg-1
Ubuntu:Pro:14.04:LTSlibsdl2-image2.0.0+dfsg-2, 2.0.0+dfsg-3build2, 2.0.0+dfsg-3
Ubuntu:16.04:LTSsdl-image1.21.2.12-5+deb9u1build0.16.04.1, 1.2.12-5build2, 0

Timeline

References

Open in Interactive Console →