Loading
Generated remediation guidance and an executive summary. No account required.
imlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to "several heap and stack based buffer overflows - partly due to integer overflows."
Cite this page
CVE-2008-6079. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2008-6079
Use Enlightenment vendor hub and Imlib2 product page to widen CVE-2008-6079 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2016-4024, CVE-2020-12761 and CVE-2024-25450 for nearby disclosures in the same product family.