[ASA-202012-2] cimg: arbitrary code execution

2020-12-05T00:00:00
ID ASA-202012-2
Type archlinux
Reporter ArchLinux
Modified 2020-12-05T00:00:00

Description

Arch Linux Security Advisory ASA-202012-2

Severity: Medium Date : 2020-12-05 CVE-ID : CVE-2020-25693 Package : cimg Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-1318

Summary

The package cimg before version 2.9.4-1 is vulnerable to arbitrary code execution.

Resolution

Upgrade to 2.9.4-1.

pacman -Syu "cimg>=2.9.4-1"

The problem has been fixed upstream in version 2.9.4.

Workaround

None.

Description

A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.

Impact

An attacker might be able to execute arbitrary code via a crafted PNM file.

References

https://github.com/dtschump/CImg/pull/295 https://github.com/dtschump/CImg/commit/7db6d08355d09414d407e26aac10bb5825343e3a https://security.archlinux.org/CVE-2020-25693