Vulnerability Name:

CVE-2008-2426 (CCN-42732)

Assigned:2008-05-29
Published:2008-05-29
Updated:2018-10-11
Summary:Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-2426

Source: CCN
Type: ENLIGHTENMENT Web site
Welcome to the Enlightenment Project

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:018

Source: CCN
Type: SA30401
imlib2 PNM and XPM Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
30401

Source: SECUNIA
Type: Vendor Advisory
30485

Source: SECUNIA
Type: Vendor Advisory
30572

Source: SECUNIA
Type: Vendor Advisory
30727

Source: SECUNIA
Type: Vendor Advisory
31982

Source: CCN
Type: Secunia Research 29/05/2008
imlib2 PNM and XPM Buffer Overflows

Source: MISC
Type: Vendor Advisory
http://secunia.com/secunia_research/2008-25/advisory/

Source: CCN
Type: SECTRACK ID: 1020146
imlib2 Stack Overflow in Processing PNM and XPM Images Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1020146

Source: DEBIAN
Type: UNKNOWN
DSA-1594

Source: DEBIAN
Type: DSA-1594
imlib2 -- buffer overflows

Source: CCN
Type: CVS Repository
imlib2

Source: CCN
Type: GLSA-200806-03
Imlib 2: User-assisted execution of arbitrary code

Source: GENTOO
Type: UNKNOWN
GLSA-200806-03

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:123

Source: CCN
Type: OSVDB ID: 45692
imlib2 loader_pnm.c load() Function PNM File Handling Overflow

Source: CCN
Type: OSVDB ID: 45693
imlib2 loader_xpm.c load() Function XPM File Handling Overflow

Source: CCN
Type: OSVDB ID: 49970
imlib2 XPM Loader load() Function Crafted XPM File Handling Overflow

Source: BUGTRAQ
Type: UNKNOWN
20080529 Secunia Research: imlib2 PNM and XPM Buffer Overflow

Source: BID
Type: UNKNOWN
29417

Source: CCN
Type: BID-29417
'imlib2' Library Multiple Buffer Overflow Vulnerabilities

Source: CCN
Type: USN-697-1
Imlib2 vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-697-1

Source: VUPEN
Type: Vendor Advisory
ADV-2008-1700

Source: XF
Type: UNKNOWN
imlib2-pnm-xpm-bo(42732)

Source: XF
Type: UNKNOWN
imlib2-pnm-xpm-bo(42732)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-4842

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-4871

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-4950

Source: SUSE
Type: SUSE-SR:2008:018
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:carsten_haitzler:imlib2:1.4.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:enlightenment:imlib2:1.4.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20082426
    V
    CVE-2008-2426
    2022-06-30
    oval:org.opensuse.security:def:112434
    P
    imlib2-1.7.1-1.6 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:26175
    P
    Security update for xen (Moderate)
    2021-12-01
    oval:org.opensuse.security:def:105940
    P
    imlib2-1.7.1-1.6 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:36422
    P
    imlib2-1.4.2-2.18.53 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26047
    P
    Security update for xen (Important)
    2021-05-12
    oval:org.opensuse.security:def:25983
    P
    Security update for openexr (Moderate)
    2020-12-23
    oval:org.opensuse.security:def:25971
    P
    Security update for fontforge (Moderate)
    2020-12-04
    oval:org.opensuse.security:def:25972
    P
    Security update for postgresql12 (Important)
    2020-12-04
    oval:org.opensuse.security:def:26601
    P
    libsamplerate on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26747
    P
    libgdiplus0 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26313
    P
    Security update for python-requests (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26650
    P
    xdg-utils on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27385
    P
    cvs-doc on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26397
    P
    Security update for plasma5-workspace (Important)
    2020-12-01
    oval:org.opensuse.security:def:26689
    P
    ed on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27420
    P
    imlib2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26548
    P
    freetype2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26703
    P
    fvwm2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26256
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.mitre.oval:def:20804
    P
    USN-697-1 -- imlib2 vulnerability
    2014-06-30
    oval:org.mitre.oval:def:8109
    P
    DSA-1594 imlib2 -- buffer overflows
    2014-06-23
    oval:org.mitre.oval:def:18732
    P
    DSA-1594-1 imlib2
    2014-06-23
    oval:org.debian:def:1594
    V
    buffer overflows
    2008-06-11
    BACK
    carsten_haitzler imlib2 1.4.0
    enlightenment imlib2 1.4.0
    gentoo linux *
    mandrakesoft mandrake linux corporate server 3.0
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04