An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/derf/feh/issues/709 | third party advisory issue tracking exploit |
https://git.enlightenment.org/old/legacy-imlib2/issues/20 | third party advisory issue tracking exploit |