| Vulnerability Name: | CVE-2018-3837 (CCN-141447) | ||||||||||||||||||||||||||||
| Assigned: | 2018-04-10 | ||||||||||||||||||||||||||||
| Published: | 2018-04-10 | ||||||||||||||||||||||||||||
| Updated: | 2022-10-25 | ||||||||||||||||||||||||||||
| Summary: | An exploitable information disclosure vulnerability exists in the PCX image rendering functionality of Simple DirectMedia Layer SDL2_image-2.0.2. A specially crafted PCX image can cause an out-of-bounds read on the heap, resulting in information disclosure . An attacker can display a specially crafted image to trigger this vulnerability. | ||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
4.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-3837 Source: XF Type: UNKNOWN simpledirectmedia-cve20183837-info-disc(141447) Source: GENTOO Type: Third Party Advisory GLSA-201903-17 Source: DEBIAN Type: Third Party Advisory DSA-4177 Source: DEBIAN Type: Third Party Advisory DSA-4184 Source: CCN Type: Simple DirectMedia Layer Web site SDL2_image Source: MISC Type: Third Party Advisory https://www.starwindsoftware.com/security/sw-20191008-0001/ Source: CCN Type: Talos Vulnerability Report TALOS-2017-0519 Simple DirectMedia Layer SDL2_Image IMG_LoadPCX_RW Information Disclosure Vulnerability Source: MISC Type: Exploit, Technical Description, Third Party Advisory https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0519 | ||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||