CVE-2019-5059 PUBLISHED

An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

EPSS 0.99% · 76.7th percentile

Risk Scores

EPSS Score
0.99%
76.7th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlibsdl2-image0, 2.0.3+dfsg1-1, 2.0.2+dfsg1-1
Ubuntu:16.04:LTSlibsdl2-image2.0.1+dfsg-2, 0, 2.0.0+dfsg-3build2
Ubuntu:20.04:LTSlibsdl2-image0
Ubuntu:Pro:14.04:LTSlibsdl2-image2.0.0+dfsg-3+deb8u2build0.14.04.1~esm1, 2.0.0+dfsg-3+deb8u1build0.14.04.1, 2.0.0+dfsg-3build2

Timeline

References

Open in Interactive Console →