Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
References
Link | Resource |
---|---|
http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f | Mailing List Patch |
http://rhn.redhat.com/errata/RHSA-2013-0687.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0746.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:116 | Broken Link |
http://www.palemoon.org/releasenotes-ng.shtml | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=910149 | Exploit Issue Tracking Patch |
https://support.f5.com/csp/article/K51392553 | Third Party Advisory |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2013-01-31 23:55
Updated : 2024-02-15 21:08
NVD link : CVE-2013-1591
Mitre link : CVE-2013-1591
CVE.ORG link : CVE-2013-1591
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_virtualization
palemoon
- pale_moon
CWE
CWE-190
Integer Overflow or Wraparound