{"vuid":"VU#369800","idnumber":"369800","name":"Little CMS 2 DefaultICCintents double-free vulnerability","keywords":["lcms2","liblcms2","icc"],"overview":"Little CMS 2 contains a double-free vulnerability in the DefaultICCintents function, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Little CMS is an open-source color management engine that supports the International Color Consortium (ICC) standard. Little CMS 2.5 and earlier 2.x versions (liblcms2) contain a double-free vulnerability in the DefaultICCintents() function, which is provided in cmscnvrt.c. When the \"Lut\" cmsPipeline object is freed more than once, this can result in an exploitable memory corruption situation. Although this issue was addressed in 2013, it was not assigned a CVE identifier at that time. Because of this, some vendors may not have upgraded liblcms2 to a version that contains the fix for this vulnerability.","impact":"By causing an application to process a malformed ICC profile, a remote, unauthenticated attacker may be able to cause arbitrary code execution with the privileges of the application that uses the Little CMS library. Exploitability of the vulnerability depends on how the application uses liblcms2 and what capabilities are exposed to an attacker.","resolution":"Apply an update This issue is resolved in Little CMS 2.6. Please check with your vendor for update availability.","workarounds":"","sysaffected":"","thanks":"This vulnerability was corrected in 2013 by Marti Maria, and was independently discovered by Will Dormann of the CERT/CC.","author":"This document was written by Will Dormann.","public":["http://www.littlecms.com/","https://github.com/mm2/Little-CMS/commit/fefaaa43c382eee632ea3ad0cfa915335140e1db#diff-189a94f0a7a47efdd43f5567e27a973b","https://penteston.com/OSVDB-105462","http://www.ubuntu.com/usn/usn-2961-1/"],"cveids":["CVE-2013-7455"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-04-29T18:45:06Z","publicdate":"2013-07-10T00:00:00Z","datefirstpublished":"2016-05-04T17:31:33Z","dateupdated":"2016-05-04T21:07:19Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"H","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"7.4","cvss_environmentalscore":"7.39092884544","cvss_environmentalvector":"CDP:ND/TD:H/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}