Secunia Research has discovered a vulnerability in imlib2, which can be exploited by malicious people to compromise an application using the library.
The vulnerability is caused due to a logic error within the "IMAGE_DIMENSIONS_OK()" macro in src/lib/image.h. This can be exploited to cause heap-based buffer overflows via e.g. specially crafted ARGB, XPM, and BMP image files.
The vulnerability is confirmed in version 1.4.3. Previous versions are not affected.
Solution: Fixed in the SVN repository.
Provided and/or discovered by: Stefan Cornelius, Secunia Research
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org