{"id":"UBUNTU-CVE-2017-2888","details":"An exploitable integer overflow vulnerability exists when creating a new RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer overflow resulting in too little memory being allocated which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.","modified":"2026-02-04T03:09:42.828591Z","published":"2017-10-11T00:00:00Z","related":["USN-4143-1"],"upstream":["CVE-2017-2888"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2888"},{"type":"REPORT","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0395"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4143-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-2888"}],"affected":[{"package":{"name":"libsdl2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libsdl2@2.0.4+dfsg1-2ubuntu2.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.4+dfsg1-2ubuntu2.16.04.2"}]}],"versions":["2.0.2+dfsg1-6ubuntu2","2.0.4+dfsg1-2","2.0.4+dfsg1-2ubuntu1","2.0.4+dfsg1-2ubuntu2","2.0.4+dfsg1-2ubuntu2.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.0.4+dfsg1-2ubuntu2.16.04.2","binary_name":"libsdl2-2.0-0"},{"binary_version":"2.0.4+dfsg1-2ubuntu2.16.04.2","binary_name":"libsdl2-dev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2888.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}