Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2017/02/21/4 | mailing list exploit third party advisory |
https://bugzilla.gnome.org/show_bug.cgi?id=779016 | issue tracking patch vendor advisory |
http://www.securityfocus.com/bid/96779 | vdb entry third party advisory |
http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html | third party advisory |
http://www.openwall.com/lists/oss-security/2017/02/26/1 | third party advisory mailing list |
https://security.gentoo.org/glsa/201709-08 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/ | vendor advisory |