An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the "extract_icons" function in the "extract.c" source file. This issue can be triggered by processing a corrupted ico file and will result in an icotool crash.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201801-12 | third party advisory vendor advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854054 | issue tracking mailing list vendor advisory exploit |
http://rhn.redhat.com/errata/RHSA-2017-0837.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/96288 | vdb entry third party advisory |
http://www.debian.org/security/2017/dsa-3807 | third party advisory vendor advisory |