Bug 647907 (CVE-2009-2175) - CVE-2009-2175 xcftools: stack-based buffer overflow in flatten.c
Summary: CVE-2009-2175 xcftools: stack-based buffer overflow in flatten.c
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2009-2175
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 647908
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-10-29 20:07 UTC by Vincent Danen
Modified: 2019-09-29 12:40 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-11-09 11:53:36 UTC


Attachments (Terms of Use)

Description Vincent Danen 2010-10-29 20:07:06 UTC
This is an old issue that is not a problem with current Fedora releases (due to providing xcftools 1.0.7), however gnome-xcf-thumbnailer embedds what looks like xcftools 1.0.4 (vulnerable version) or earlier, as reported to Debian [1].  A patch [2] exists in the original Debian bug report [3] to correct the flaw.  The MITRE entry for this flaw follows:

Stack-based buffer overflow in the flattenIncrementally function in flatten.c in xcftools 1.0.4, as reachable from the (1) xcf2pnm and (2) xcf2png utilities, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image that causes a conversion to a location "above or to the left of the canvas." NOTE: some of these details are obtained from third party information. 

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601735
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;filename=533361.patch;att=1;bug=533361
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=533361

Comment 1 Vincent Danen 2010-10-29 20:08:17 UTC
Created gnome-xcf-thumbnailer tracking bugs for this issue

Affects: fedora-all [bug 647908]


Note You need to log in before you can comment on or make changes to this bug.