CVE-2013-1591

Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors.  NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
VendorProductVersion
redhatenterprise_virtualization
3.0
redhatenterprise_linux
6.0
palemoonpale_moon
𝑥
< 15.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pixman
bullseye (security)
0.40.0-1.1~deb11u1
fixed
bullseye
0.40.0-1.1~deb11u1
fixed
squeeze
not-affected
bookworm
0.42.2-1
fixed
sid
0.42.2-1
fixed
trixie
0.42.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pixman
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
not-affected
raring
not-affected
quantal
ignored
precise
not-affected
oneiric
not-affected
lucid
not-affected
hardy
ignored