CVE-2008-2426

NameCVE-2008-2426
DescriptionMultiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1594-1
NVD severityhigh (attack range: remote, user-initiated)
Debian Bugs483816
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
imlib2 (PTS)squeeze1.4.2-8fixed
wheezy1.4.5-1fixed
jessie, sid1.4.6-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
imlibsource(unstable)(not affected)
imlib2source(unstable)1.4.0-1.1medium483816
imlib2sourceetch1.3.0.0debian1-4+etch1highDSA-1594-1

Notes

- imlib <not-affected> (Partly not present / partly fixed)

Search for package or bug name: Reporting problems