ID CVE-2015-8366
Summary Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
References
Vulnerable Configurations
  • cpe:2.3:a:libraw:libraw:0.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.12.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.12.5:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.12.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.3:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.4:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.5:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.6:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.7:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.13.8:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.13.8:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.2:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.3:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.4:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.5:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.6:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.7:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.14.8:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.14.8:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.15.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.15.4:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.15.4:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.16.1:-:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.16.1:-:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.16.1:alpha:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.16.1:alpha:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libraw:libraw:0.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:libraw:libraw:0.17.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 21-01-2020 - 16:07)
Impact:
Exploitability:
CWE CWE-129
CAPEC
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
misc
Last major update 21-01-2020 - 16:07
Published 14-01-2020 - 16:15
Last modified 21-01-2020 - 16:07
Back to Top