CVE-2013-1591

Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors.  NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Severity
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Atk. Vector
NETWORK
Atk. Complexity
LOW
Priv. Required
NONE
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
redhatenterprise_virtualization
3.0
redhatenterprise_linux
6.0
palemoonpale_moon
𝑥
< 15.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pixman
bullseye (security)
0.40.0-1.1~deb11u1
fixed
bullseye
0.40.0-1.1~deb11u1
fixed
squeeze
not-affected
bookworm
0.42.2-1
fixed
sid
0.42.2-1
fixed
trixie
0.42.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pixman
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
not-affected
raring
not-affected
quantal
ignored
precise
not-affected
oneiric
not-affected
lucid
not-affected
hardy
ignored