An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/100541 | vdb entry broken link |
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html | third party advisory mailing list |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377 | exploit third party advisory technical description |