CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
75.9%
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.
Vendor | Product | Version | CPE |
---|---|---|---|
libsdl | simple_directmedia_layer | * | cpe:2.3:a:libsdl:simple_directmedia_layer:*:*:*:*:*:*:*:* |
opensuse | leap | 15.0 | cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* |
opensuse | leap | 42.3 | cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
debian | debian_linux | 9.0 | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
fedoraproject | fedora | 31 | cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 12.04 | cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* |
canonical | ubuntu_linux | 14.04 | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* |
canonical | ubuntu_linux | 16.04 | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 18.04 | cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
bugzilla.libsdl.org/show_bug.cgi?id=4499
discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
lists.debian.org/debian-lts-announce/2019/03/msg00015.html
lists.debian.org/debian-lts-announce/2019/03/msg00016.html
lists.debian.org/debian-lts-announce/2019/10/msg00020.html
lists.debian.org/debian-lts-announce/2019/10/msg00021.html
lists.debian.org/debian-lts-announce/2021/01/msg00024.html
lists.debian.org/debian-lts-announce/2021/10/msg00032.html
lists.debian.org/debian-lts-announce/2023/02/msg00008.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
security.gentoo.org/glsa/201909-07
security.gentoo.org/glsa/202305-17
usn.ubuntu.com/4143-1/
usn.ubuntu.com/4156-1/
usn.ubuntu.com/4156-2/
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
75.9%