Vulnerability Name: | CVE-2021-20240 (CCN-202701) | ||||||||||||
Assigned: | 2020-12-17 | ||||||||||||
Published: | 2021-02-16 | ||||||||||||
Updated: | 2021-06-02 | ||||||||||||
Summary: | A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 8.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:C)
| ||||||||||||
Vulnerability Type: | CWE-787 CWE-191 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20240 Source: CCN Type: Red Hat Bugzilla - Bug 1926787 (CVE-2021-20240) - CVE-2021-20240 gdk-pixbuf: integer wraparound in the GIF loader of gdk-pixbuf via crafted input leads to segmentation fault Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1926787 Source: XF Type: UNKNOWN gnome-cve202120240-code-exec(202701) Source: CCN Type: gdk-pixbuf GIT Repository Check the memset length argument Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-755ba8968a Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-c918632e13 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-2e59756cbe Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-20240 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |