MGASA-2015-0261

Source
https://advisories.mageia.org/MGASA-2015-0261.html
Import Source
https://advisories.mageia.org/MGASA-2015-0261.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0261
Related
Published
2015-07-05T17:22:03Z
Modified
2015-07-09T07:56:53Z
Summary
Updated libwmf package fixes security vulnerability
Details

It was discovered that libwmf did not correctly process certain WMF (Windows Metafiles) containing BMP images. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running the application (CVE-2015-0848, CVE-2015-4588).

Two out of bounds reads in libwmf were also discovered, one in the metapencreate() function in player/meta.h (CVE-2015-4695) and one in wmf2gd.c and wmf2eps.c (CVE-2015-4696)

References
Credits

Affected packages

Mageia:5 / libwmf

Package

Name
libwmf
Purl
pkg:rpm/mageia/libwmf?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.8.4-32.2.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / libwmf

Package

Name
libwmf
Purl
pkg:rpm/mageia/libwmf?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.8.4-30.2.mga4

Ecosystem specific

{
    "section": "core"
}