Vulnerability Details : CVE-2018-3977
An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image-2.0.3. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2018-3977
Probability of exploitation activity in the next 30 days: 2.02%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-3977
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
Talos |
CWE ids for CVE-2018-3977
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-3977
-
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0645
TALOS-2018-0645 || Cisco Talos Intelligence Group - Comprehensive Threat IntelligenceExploit;Third Party Advisory
-
https://security.gentoo.org/glsa/201903-17
SDL2_Image: Multiple vulnerabilities (GLSA 201903-17) — Gentoo securityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html
[SECURITY] [DLA 1861-1] libsdl2-image security update
-
https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
[SECURITY] [DLA 1865-1] sdl-image1.2 security update
-
https://usn.ubuntu.com/4238-1/
USN-4238-1: SDL_image vulnerabilities | Ubuntu security notices
Products affected by CVE-2018-3977
- cpe:2.3:a:libsdl:sdl_image:2.0.3:*:*:*:*:*:*:*