CVE-2016-5684

NameCVE-2016-5684
DescriptionAn exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-647-1, DSA-3692-1
NVD severitymedium (attack range: remote)
Debian Bugs839827

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freeimage (PTS)wheezy3.15.1-1.1vulnerable
wheezy (security)3.15.1-1.1+deb7u1fixed
jessie (security), jessie3.15.4-4.2+deb8u1fixed
buster, sid, stretch3.17.0+ds1-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freeimagesource(unstable)3.17.0+ds1-3medium839827
freeimagesourcejessie3.15.4-4.2+deb8u1mediumDSA-3692-1
freeimagesourcewheezy3.15.1-1.1+deb7u1mediumDLA-647-1

Notes

http://www.talosintelligence.com/reports/TALOS-2016-0189/
http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.17&r2=1.18
http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.18&r2=1.19

Search for package or bug name: Reporting problems