CVE-2016-5684

NameCVE-2016-5684
DescriptionAn exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-647-1, DSA-3692-1
Debian Bugs839827

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freeimage (PTS)jessie, jessie (lts)3.15.4-4.2+deb8u2fixed
stretch (security)3.17.0+ds1-5+deb9u1fixed
stretch (lts), stretch3.17.0+ds1-5+deb9u2fixed
buster (security), buster, buster (lts)3.18.0+ds2-1+deb10u2fixed
bullseye (security), bullseye3.18.0+ds2-6+deb11u1fixed
bookworm (security), bookworm3.18.0+ds2-9+deb12u1fixed
sid, trixie3.18.0+ds2-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freeimagesourcewheezy3.15.1-1.1+deb7u1DLA-647-1
freeimagesourcejessie3.15.4-4.2+deb8u1DSA-3692-1
freeimagesource(unstable)3.17.0+ds1-3839827

Notes

http://www.talosintelligence.com/reports/TALOS-2016-0189/
http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.17&r2=1.18
http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.18&r2=1.19

Search for package or bug name: Reporting problems