Broken Double Free Vulnerability in libbabl by GEGL
CVE-2020-37239
Key Information:
Badges
What is CVE-2020-37239?
libbabl version 0.1.62 contains a significant vulnerability related to broken double free detection. By exploiting the flaw, attackers can manipulate memory safety checks through signature overwriting in freed chunks, enabling them to invoke the babl_free() function multiple times on the same pointer without detection. This occurs because the memory allocation library's metadata overwrites libbabl's signature field during the freeing process. As a result, this oversight can potentially lead to memory corruption and allow remote code execution, posing a serious threat to application security.
Affected Version(s)
libbabl 0.1.62
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
