CVE-2009-2295

Multiple integer overflows in CamlImages 2.2 and earlier might allow context-dependent attackers to execute arbitrary code via a crafted PNG image with large width and height values that trigger a heap-based buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24 function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
jun_furusecamlimages
𝑥
≤ 2.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
advi
bookworm
1.10.2-9
fixed
bullseye
1.10.2-9
fixed
sid
2.0.0-4
fixed
trixie
2.0.0-4
fixed
camlimages
bullseye
1:5.0.4-1
fixed
bookworm
1:5.0.4-2
fixed
sid
1:5.0.5-2
fixed
trixie
1:5.0.5-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
advi
maverick
not-affected
lucid
not-affected
karmic
Fixed 1.6.0-14ubuntu0.1
released
jaunty
Fixed 1.6.0-13+lenny2build0.9.04.1
released
intrepid
ignored
hardy
Fixed 1.6.0-13ubuntu0.1
released
dapper
ignored
camlimages
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
Fixed 1:2.2.0-4+lenny2build0.9.04.1
released
intrepid
Fixed 1:2.2.0-3ubuntu0.1
released
hardy
Fixed 1:2.2.0-2ubuntu2.1
released
dapper
ignored
Common Weakness Enumeration