CVE-2019-5060

EUVD-2019-14667
An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
talosCNA
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
Affected Products (NVD)
VendorProductVersion
libsdlsdl2_image
2.0.4
opensusebackports_sle
15.0
opensusebackports_sle
15.0:sp1
opensuseleap
15.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libsdl2-image
bookworm
2.6.3+dfsg-1
fixed
bullseye
2.0.5+dfsg1-2
fixed
buster
no-dsa
jessie
no-dsa
sid
2.8.2+dfsg-1
fixed
stretch
no-dsa
trixie
2.8.2+dfsg-1
fixed
sdl-image1.2
bookworm
1.2.12-13
fixed
bullseye
1.2.12-12
fixed
buster
no-dsa
jessie
no-dsa
sid
1.2.12-14
fixed
stretch
no-dsa
trixie
1.2.12-14
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libsdl2-image
bionic
needed
disco
ignored
eoan
Fixed 2.0.5+dfsg1-1
released
focal
Fixed 2.0.5+dfsg1-1
released
groovy
Fixed 2.0.5+dfsg1-1
released
hirsute
Fixed 2.0.5+dfsg1-1
released
impish
Fixed 2.0.5+dfsg1-1
released
jammy
Fixed 2.0.5+dfsg1-1
released
kinetic
Fixed 2.0.5+dfsg1-1
released
lunar
Fixed 2.0.5+dfsg1-1
released
mantic
Fixed 2.0.5+dfsg1-1
released
noble
Fixed 2.0.5+dfsg1-1
released
trusty
needs-triage
xenial
needed