Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
References
Link | Resource |
---|---|
http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f | Mailing List Patch |
http://rhn.redhat.com/errata/RHSA-2013-0687.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0746.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:116 | Broken Link |
http://www.palemoon.org/releasenotes-ng.shtml | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=910149 | Exploit Issue Tracking Patch |
https://support.f5.com/csp/article/K51392553 | Third Party Advisory |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2013-01-31T23:00:00
Updated: 2019-05-22T12:06:04
Reserved: 2013-01-31T00:00:00
Link: CVE-2013-1591
JSON object: View
NVD Information
Status : Analyzed
Published: 2013-01-31T23:55:01.037
Modified: 2024-02-15T21:08:00.480
Link: CVE-2013-1591
JSON object: View
Redhat Information
No data.
CWE