An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.debian.org/security/2017/dsa-3978 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/100541 | vdb entry broken link |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0366 | exploit third party advisory technical description |