|
|
| |
Credit:
The information has been provided by Stefan Cornelius.
The original article can be found at: http://secunia.com/secunia_research/2010-102/
|
| |
Vulnerable Systems:
* libgdiplus version 2.6.7
The vulnerabilities are:
1) An integer overflow error within the "gdip_load_tiff_image()" function in src/tiffcodec.c can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted TIFF images in an application using the library.
2) An integer overflow error within the "gdip_load_jpeg_image_internal()" function in src/jpegcodec.c can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted JPEG images in an application using the library.
3) An integer overflow error within the "gdip_read_bmp_image()" function in src/bmpcodec.c can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted BMP images in an application using the library.
Workaround:
Do not process untrusted images in an application using the library.
CVE Information:
CVE-2010-1526
Disclosure Timeline:
12/08/2010 - Vendor notified.
12/08/2010 - Vendor response
23/08/2010 - Public disclosure.
|
|
|