Critical severity9.8NVD Advisory· Published May 13, 2016· Updated May 6, 2026
CVE-2016-4024
CVE-2016-4024
Description
Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation.
Affected products
4cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- sourceforge.net/p/enlightenment/mailman/message/35055012/nvdPatchVendor Advisory
- lists.opensuse.org/opensuse-updates/2016-05/msg00076.htmlnvdThird Party Advisory
- www.debian.org/security/2016/dsa-3555nvdThird Party Advisory
- www.securityfocus.com/bid/86073nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1035573nvdThird Party AdvisoryVDB Entry
- git.enlightenment.org/legacy/imlib2.git/commit/nvdVendor Advisory
- security.gentoo.org/glsa/201611-12nvdThird Party Advisory
News mentions
0No linked articles in our index yet.