CVE-2017-2887

An exploitable buffer overflow vulnerability exists in the XCF property handling functionality of SDL_image 2.0.1. A specially crafted xcf file can cause a stack-based buffer overflow resulting in potential code execution. An attacker can provide a specially crafted XCF file to trigger this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
talosCNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
libsdlsdl_image
2.0.1
debiandebian_linux
8.0
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libsdl2-image
bullseye
2.0.5+dfsg1-2
fixed
bookworm
2.6.3+dfsg-1
fixed
sid
2.8.2+dfsg-1
fixed
trixie
2.8.2+dfsg-1
fixed
sdl-image1.2
bullseye
1.2.12-12
fixed
bookworm
1.2.12-13
fixed
sid
1.2.12-14
fixed
trixie
1.2.12-14
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libsdl2-image
bionic
not-affected
artful
ignored
zesty
ignored
xenial
Fixed 2.0.1+dfsg-2+deb9u1build0.16.04.1
released
trusty
Fixed 2.0.0+dfsg-3+deb8u1build0.14.04.1
released
sdl-image1.2
bionic
not-affected
artful
ignored
zesty
ignored
xenial
Fixed 1.2.12-5+deb9u1build0.16.04.1
released
trusty
Fixed 1.2.12-5+deb9u1build0.14.04.1
released