Bug 1235669 (CVE-2015-4696) - CVE-2015-4696 libwmf: use-after-free flaw in meta.h
Summary: CVE-2015-4696 libwmf: use-after-free flaw in meta.h
Alias: CVE-2015-4696
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1227428 1235671 1239161 1239162
Blocks: 1227245
TreeView+ depends on / blocked
Reported: 2015-06-25 13:15 UTC by Vasyl Kaigorodov
Modified: 2019-09-29 13:34 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that libwmf did not properly process certain WMF files. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly exploit this flaw to cause a crash or execute arbitrary code with the privileges of the user running the application.
Clone Of:
Last Closed: 2015-10-21 09:31:37 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1917 0 normal SHIPPED_LIVE Important: libwmf security update 2015-10-20 20:10:07 UTC

Description Vasyl Kaigorodov 2015-06-25 13:15:40 UTC
Use after free issue was reported in libwmf when processing a crafted WMF file.
Originally reported in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
Patch is attached in BZ 1227243: https://bugzilla.redhat.com/attachment.cgi?id=1042307

Comment 1 Vasyl Kaigorodov 2015-06-25 13:17:46 UTC
Created libwmf tracking bugs for this issue:

Affects: fedora-all [bug 1235671]

Comment 3 errata-xmlrpc 2015-10-20 16:11:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2015:1917 https://rhn.redhat.com/errata/RHSA-2015-1917.html

Note You need to log in before you can comment on or make changes to this bug.