Lucene search

K
gentooGentoo FoundationGLSA-201204-05
HistoryApr 17, 2012 - 12:00 a.m.

SWFTools: User-assisted execution of arbitrary code

2012-04-1700:00:00
Gentoo Foundation
security.gentoo.org
11

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.5

Confidence

Low

EPSS

0.024

Percentile

89.9%

Background

SWFTools is a collection of SWF manipulation and generation utilities written by Rainer Böhme and Matthias Kramm.

Description

Integer overflow errors in the “getPNG()” function in png.c and the “jpeg_load()” function in jpeg.c could cause a heap-based buffer overflow.

Impact

A remote attacker could entice a user to open a specially crafted PNG or JPEG file, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

Gentoo discontinued support for SWFTools. We recommend that users unmerge swftools:

 # emerge --unmerge "media-gfx/swftools"

NOTE: Users could upgrade to “>=media-gfx/swftools-0.9.1”, however these packages are not currently stable.

OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/swftools<= 0.9.1UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.5

Confidence

Low

EPSS

0.024

Percentile

89.9%