Bug 1272993 (CVE-2015-4588) - CVE-2015-4588 libwmf: heap overflow within the RLE decoding of embedded BMP images
Summary: CVE-2015-4588 libwmf: heap overflow within the RLE decoding of embedded BMP i...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-4588
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1227245
TreeView+ depends on / blocked
 
Reported: 2015-10-19 11:38 UTC by Stefan Cornelius
Modified: 2019-09-29 13:38 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that libwmf did not correctly process certain WMF (Windows Metafiles) with embedded BMP images. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running the application.
Clone Of:
Environment:
Last Closed: 2015-10-21 09:31:50 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1917 0 normal SHIPPED_LIVE Important: libwmf security update 2015-10-20 20:10:07 UTC

Description Stefan Cornelius 2015-10-19 11:38:21 UTC
It was discovered that libwmf did not correctly process certain WMF (Windows Metafiles) with embedded RLE-compressed BMP images. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running the application.

Previously, this issue was bundled in bug#1227243.

Comment 1 Stefan Cornelius 2015-10-19 12:03:48 UTC
The patch for this issue can be found in bug 1227243, comment 7.

Comment 2 errata-xmlrpc 2015-10-20 16:11:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2015:1917 https://rhn.redhat.com/errata/RHSA-2015-1917.html


Note You need to log in before you can comment on or make changes to this bug.