CVE-2015-0852
Publication date 29 September 2015
Last updated 24 July 2024
Ubuntu priority
Multiple integer underflows in PluginPCX.cpp in FreeImage 3.17.0 and earlier allow remote attackers to cause a denial of service (heap memory corruption) via vectors related to the height and width of a window.
From the Ubuntu Security Team
It was discovered that FreeImage incorrectly handled certain PCX files. An attacker could possibly use this issue to cause a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
freeimage | 22.04 LTS jammy |
Not affected
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 3.15.4-3ubuntu0.1+esm1
|
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProReferences
Other references
- https://marc.info/?l=oss-security&m=144073280200732&w=2
- http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginPCX.cpp?r1=1.17&r2=1.18&pathrev=MAIN
- http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginPCX.cpp?r1=1.18&r2=1.19&pathrev=MAIN
- https://www.cve.org/CVERecord?id=CVE-2015-0852