Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/53883 | third party advisory vendor advisory |
http://secunia.com/advisories/53547 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-1884-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-1885-1 | vendor advisory |
http://www.libraw.org/news/libraw-0-15-2 | |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html | vendor advisory |
https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6 | patch exploit |
http://www.openwall.com/lists/oss-security/2013/05/29/7 | mailing list |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html | vendor advisory |
http://secunia.com/advisories/53938 | third party advisory |
http://www.openwall.com/lists/oss-security/2013/06/10/1 | mailing list |
http://secunia.com/advisories/53888 | third party advisory vendor advisory |