CVE-2013-1591
Published: 31 January 2013
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Notes
Author | Note |
---|---|
jdstrand | reduced to low for stack-protector |
mdeslaur | patch below seems to be difference between Pale Moon 15.3.2 and 15.4 |
Priority
Status
Package | Release | Status |
---|---|---|
pixman Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Not vulnerable
(code not present)
|
|
oneiric |
Not vulnerable
(code not present)
|
|
precise |
Not vulnerable
(0.30.2-1ubuntu0.0.0.0.2)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Not vulnerable
(0.28.2-0ubuntu1)
|
|
saucy |
Not vulnerable
(0.28.2-0ubuntu1)
|
|
trusty |
Not vulnerable
(0.28.2-0ubuntu1)
|
|
upstream |
Needs triage
|
|
utopic |
Not vulnerable
(0.28.2-0ubuntu1)
|
|
vivid |
Not vulnerable
(0.28.2-0ubuntu1)
|
|
wily |
Not vulnerable
(0.28.2-0ubuntu1)
|
|
Patches: upstream: http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |