Upstream information

CVE-2008-2426 at MITRE

Description

Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entries: 394703 [RESOLVED / FIXED], 447093 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Software Development Kit 11 SP4
  • imlib2 >= 1.4.2-2.18.53
  • imlib2-devel >= 1.4.2-2.18.53
  • imlib2-filters >= 1.4.2-2.18.53
  • imlib2-loaders >= 1.4.2-2.18.53
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA imlib2
SUSE Linux Enterprise SDK 10 SP2
  • imlib2 >= 1.2.1-17.14
  • imlib2-devel >= 1.2.1-17.14
  • imlib2-loaders >= 1.2.1-17.14
sled10.x86-64
sle10-sp2-sdk.x86-64
sle10-sp1-sdk.x86-64
sled10-sp2.x86-64
sle10-sp2-sdk.ppc
sle10-sp2-sdk.ia64
sled10.x86
sle10-sp1-sdk.s390x
sle10-sp1-sdk.ia64
sle10-sp1-sdk.x86
sle10-sp2-sdk.x86
sle10-sp1-sdk.ppc
sle10-sp2-sdk.s390x
sled10-sp2.x86
ZYPP Patch Nr: 5572
openSUSE 11.0
  • imlib2-debuginfo >= 1.4.0-46.3
  • imlib2-debugsource >= 1.4.0-46.3
openSUSE 11.0
  • imlib2 >= 1.4.0-46.3
  • imlib2-devel >= 1.4.0-46.3
  • imlib2-filters >= 1.4.0-46.3
  • imlib2-loaders >= 1.4.0-46.3