Vulnerabilities > CVE-2019-6245 - Out-of-bounds Write vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An issue was discovered in Anti-Grain Geometry (AGG) 2.4 as used in SVG++ (aka svgpp) 1.2.3. In the function agg::cell_aa::not_equal, dx is assigned to (x2 - x1). If dx >= dx_limit, which is (16384 << poly_subpixel_shift), this function will call itself recursively. There can be a situation where (x2 - x1) is always bigger than dx_limit during the recursion, leading to continual stack consumption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
OS | 2 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DLA-1656.NASL |
description | A stack overflow vulnerability was discovered in AGG, the AntiGrain Geometry graphical toolkit, that may lead to code execution if a malformed file is processed. Since AGG only provides a static library, the desmume and exactimage packages were rebuilt against the latest security update. For Debian 8 |
last seen | 2020-03-17 |
modified | 2019-02-04 |
plugin id | 121553 |
published | 2019-02-04 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/121553 |
title | Debian DLA-1656-1 : agg security update |
code |
|
References
- https://github.com/svgpp/svgpp/issues/70
- https://lists.debian.org/debian-lts-announce/2019/02/msg00001.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00038.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html
- https://github.com/svgpp/svgpp/issues/70
- https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00038.html
- https://lists.debian.org/debian-lts-announce/2019/02/msg00001.html