Vulnerabilites related to libraw - libraw
cve-2018-5802
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/79000/ | third-party-advisory, x_refsource_SECUNIA | |
https://access.redhat.com/errata/RHSA-2018:3065 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/3615-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.933Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.7", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"kodak_radc_load_raw()\" function (internal/dcraw_common.cpp) related to the \"buf\" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through out-of-bounds read memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T17:54:18", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5802", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.7", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"kodak_radc_load_raw()\" function (internal/dcraw_common.cpp) related to the \"buf\" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through out-of-bounds read memory access", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "RHSA-2018:3065", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5802", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.933Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5809
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/81800/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.894Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.9", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"LibRaw::parse_exif()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "Arbitrary code execution through stack-based buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-07T21:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5809", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.9", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"LibRaw::parse_exif()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Arbitrary code execution through stack-based buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "81800", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { name: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5809", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.894Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5806
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "leaf_hdr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/advisories/81000/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:3065 | vendor-advisory, x_refsource_REDHAT | |
https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:54.588Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.8", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"leaf_hdr_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through NULL pointer dereference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { name: "81000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5806", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.8", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"leaf_hdr_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through NULL pointer dereference", }, ], }, ], }, references: { reference_data: [ { name: "81000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "RHSA-2018:3065", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5806", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:54.588Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24890
Vulnerability from cvelistv5
Published
2020-09-16 14:39
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/335 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202010-05 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:09.411Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/335", }, { name: "FEDORA-2020-2d9d628dd2", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/", }, { name: "GLSA-202010-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202010-05", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-23T15:11:20", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/335", }, { name: "FEDORA-2020-2d9d628dd2", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/", }, { name: "GLSA-202010-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202010-05", }, ], tags: [ "disputed", ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-24890", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "** DISPUTED ** libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/335", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/335", }, { name: "FEDORA-2020-2d9d628dd2", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/", }, { name: "GLSA-202010-05", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202010-05", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24890", datePublished: "2020-09-16T14:39:49", dateReserved: "2020-08-28T00:00:00", dateUpdated: "2024-08-04T15:19:09.411Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-35531
Vulnerability from cvelistv5
Published
2022-09-01 17:52
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/270 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | mailing-list, x_refsource_MLIST |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:02:08.127Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/270", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, ], descriptions: [ { lang: "en", value: "In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\\src\\x3f\\x3f_utils_patched.cpp) when reading data from an image file.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-16T12:06:15", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/270", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2020-35531", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\\src\\x3f\\x3f_utils_patched.cpp) when reading data from an image file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/270", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/270", }, { name: "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2020-35531", datePublished: "2022-09-01T17:52:06", dateReserved: "2020-12-17T00:00:00", dateUpdated: "2024-08-04T17:02:08.127Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-2127
Vulnerability from cvelistv5
Published
2013-08-14 15:00
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/53547 | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2013/05/29/7 | mailing-list, x_refsource_MLIST | |
http://www.libraw.org/news/libraw-0-15-1 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T15:27:40.992Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "53547", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/53547", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d", }, { name: "[oss-security] 20130529 Re: CVE request: libraw: multiple issues", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.libraw.org/news/libraw-0-15-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-08-14T15:00:00Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "53547", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/53547", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d", }, { name: "[oss-security] 20130529 Re: CVE request: libraw: multiple issues", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.libraw.org/news/libraw-0-15-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2013-2127", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "53547", refsource: "SECUNIA", url: "http://secunia.com/advisories/53547", }, { name: "https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d", }, { name: "[oss-security] 20130529 Re: CVE request: libraw: multiple issues", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { name: "http://www.libraw.org/news/libraw-0-15-1", refsource: "CONFIRM", url: "http://www.libraw.org/news/libraw-0-15-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2013-2127", datePublished: "2013-08-14T15:00:00Z", dateReserved: "2013-02-19T00:00:00Z", dateUpdated: "2024-09-16T17:59:00.243Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-16910
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36 | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/76000/ | third-party-advisory, x_refsource_SECUNIA | |
https://usn.ubuntu.com/3615-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:35:21.282Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { name: "76000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3615-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.6", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"LibRaw::xtrans_interpolate()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through invalid read memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { name: "76000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3615-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2017-16910", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.6", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"LibRaw::xtrans_interpolate()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through invalid read memory access", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { name: "76000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { name: "USN-3615-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3615-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2017-16910", datePublished: "2018-12-07T22:00:00", dateReserved: "2017-11-21T00:00:00", dateUpdated: "2024-08-05T20:35:21.282Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-14608
Vulnerability from cvelistv5
Published
2017-09-20 17:00
Modified
2024-08-05 19:34
Severity ?
EPSS score ?
Summary
In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21 | x_refsource_CONFIRM | |
https://github.com/LibRaw/LibRaw/issues/101 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:34:39.041Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/101", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-09-20T00:00:00", descriptions: [ { lang: "en", value: "In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-20T17:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/issues/101", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-14608", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21", }, { name: "https://github.com/LibRaw/LibRaw/issues/101", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/issues/101", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-14608", datePublished: "2017-09-20T17:00:00", dateReserved: "2017-09-20T00:00:00", dateUpdated: "2024-08-05T19:34:39.041Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-13735
Vulnerability from cvelistv5
Published
2017-08-29 06:00
Modified
2024-09-16 23:42
Severity ?
EPSS score ?
Summary
There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1483988 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:05:20.072Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1483988", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-29T06:00:00Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1483988", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-13735", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1483988", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1483988", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-13735", datePublished: "2017-08-29T06:00:00Z", dateReserved: "2017-08-29T00:00:00Z", dateUpdated: "2024-09-16T23:42:15.422Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-2126
Vulnerability from cvelistv5
Published
2013-08-14 15:00
Modified
2024-09-17 02:01
Severity ?
EPSS score ?
Summary
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/53883 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/53547 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ubuntu.com/usn/USN-1884-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.ubuntu.com/usn/USN-1885-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.libraw.org/news/libraw-0-15-2 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html | vendor-advisory, x_refsource_SUSE | |
https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2013/05/29/7 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/53938 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2013/06/10/1 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/53888 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T15:27:40.821Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "53883", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/53883", }, { name: "53547", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/53547", }, { name: "USN-1884-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-1884-1", }, { name: "USN-1885-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-1885-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.libraw.org/news/libraw-0-15-2", }, { name: "openSUSE-SU-2013:1085", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6", }, { name: "[oss-security] 20130529 Re: CVE request: libraw: multiple issues", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { name: "openSUSE-SU-2013:1083", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html", }, { name: "53938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/53938", }, { name: "[oss-security] 20130610 Re: CVE request: libraw: multiple issues", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2013/06/10/1", }, { name: "53888", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/53888", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-08-14T15:00:00Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "53883", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/53883", }, { name: "53547", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/53547", }, { name: "USN-1884-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-1884-1", }, { name: "USN-1885-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-1885-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.libraw.org/news/libraw-0-15-2", }, { name: "openSUSE-SU-2013:1085", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6", }, { name: "[oss-security] 20130529 Re: CVE request: libraw: multiple issues", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { name: "openSUSE-SU-2013:1083", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html", }, { name: "53938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/53938", }, { name: "[oss-security] 20130610 Re: CVE request: libraw: multiple issues", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2013/06/10/1", }, { name: "53888", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/53888", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2013-2126", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "53883", refsource: "SECUNIA", url: "http://secunia.com/advisories/53883", }, { name: "53547", refsource: "SECUNIA", url: "http://secunia.com/advisories/53547", }, { name: "USN-1884-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-1884-1", }, { name: "USN-1885-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-1885-1", }, { name: "http://www.libraw.org/news/libraw-0-15-2", refsource: "CONFIRM", url: "http://www.libraw.org/news/libraw-0-15-2", }, { name: "openSUSE-SU-2013:1085", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html", }, { name: "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6", }, { name: "[oss-security] 20130529 Re: CVE request: libraw: multiple issues", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { name: "openSUSE-SU-2013:1083", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html", }, { name: "53938", refsource: "SECUNIA", url: "http://secunia.com/advisories/53938", }, { name: "[oss-security] 20130610 Re: CVE request: libraw: multiple issues", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2013/06/10/1", }, { name: "53888", refsource: "SECUNIA", url: "http://secunia.com/advisories/53888", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2013-2126", datePublished: "2013-08-14T15:00:00Z", dateReserved: "2013-02-19T00:00:00Z", dateUpdated: "2024-09-17T02:01:31.102Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5813
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/83050/ | third-party-advisory, x_refsource_SECUNIA | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/ | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.193Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "83050", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83050/", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.11", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"parse_minolta()\" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through infinite loop", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-20T19:39:50", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "83050", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83050/", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5813", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.11", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"parse_minolta()\" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through infinite loop", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "83050", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/83050/", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/", }, { name: "https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5813", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.193Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20364
Vulnerability from cvelistv5
Published
2018-12-22 17:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/194 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106299 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:19.224Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/194", }, { name: "106299", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106299", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-12-22T00:00:00", descriptions: [ { lang: "en", value: "LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/194", }, { name: "106299", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106299", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20364", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/194", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/194", }, { name: "106299", refsource: "BID", url: "http://www.securityfocus.com/bid/106299", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20364", datePublished: "2018-12-22T17:00:00", dateReserved: "2018-12-22T00:00:00", dateUpdated: "2024-08-05T11:58:19.224Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5812
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/81800/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 | x_refsource_MISC | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:54.564Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.9", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"nikon_coolscan_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through NULL pointer dereference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5812", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.9", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"nikon_coolscan_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through NULL pointer dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { name: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5812", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:54.564Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-14348
Vulnerability from cvelistv5
Published
2017-09-12 19:00
Modified
2024-08-05 19:27
Severity ?
EPSS score ?
Summary
LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/100 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100866 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:27:39.039Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/100", }, { name: "100866", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/100866", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-09-12T00:00:00", descriptions: [ { lang: "en", value: "LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-19T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/issues/100", }, { name: "100866", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/100866", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-14348", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/100", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/issues/100", }, { name: "100866", refsource: "BID", url: "http://www.securityfocus.com/bid/100866", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-14348", datePublished: "2017-09-12T19:00:00", dateReserved: "2017-09-12T00:00:00", dateUpdated: "2024-08-05T19:27:39.039Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8367
Vulnerability from cvelistv5
Published
2020-01-14 15:19
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | x_refsource_MISC | |
http://www.libraw.org/news/libraw-0-17-1 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Nov/108 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.666Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-24T00:00:00", descriptions: [ { lang: "en", value: "The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-14T15:19:49", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, { tags: [ "x_refsource_MISC", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8367", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { name: "http://www.libraw.org/news/libraw-0-17-1", refsource: "MISC", url: "http://www.libraw.org/news/libraw-0-17-1", }, { name: "http://seclists.org/fulldisclosure/2015/Nov/108", refsource: "MISC", url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8367", datePublished: "2020-01-14T15:19:49", dateReserved: "2015-11-26T00:00:00", dateUpdated: "2024-08-06T08:13:32.666Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20337
Vulnerability from cvelistv5
Published
2018-12-21 09:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/192 | x_refsource_MISC | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:19.183Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/192", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-12-21T00:00:00", descriptions: [ { lang: "en", value: "There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/192", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20337", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/192", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/192", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20337", datePublished: "2018-12-21T09:00:00", dateReserved: "2018-12-21T00:00:00", dateUpdated: "2024-08-05T11:58:19.183Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-1729
Vulnerability from cvelistv5
Published
2023-05-15 00:00
Modified
2024-08-02 05:57
Severity ?
EPSS score ?
Summary
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:57:24.974Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/557", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188240", }, { name: "FEDORA-2023-b19f236bc7", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/", }, { name: "FEDORA-2023-88c87f6191", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/", }, { name: "[debian-lts-announce] 20230527 [SECURITY] [DLA 3433-1] libraw security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { name: "DSA-5412", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5412", }, { name: "GLSA-202312-08", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/202312-08", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21.1", }, ], }, ], descriptions: [ { lang: "en", value: "A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119->CWE-787", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-12-22T13:06:23.193897", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { url: "https://github.com/LibRaw/LibRaw/issues/557", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188240", }, { name: "FEDORA-2023-b19f236bc7", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/", }, { name: "FEDORA-2023-88c87f6191", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/", }, { name: "[debian-lts-announce] 20230527 [SECURITY] [DLA 3433-1] libraw security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { name: "DSA-5412", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5412", }, { name: "GLSA-202312-08", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/202312-08", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2023-1729", datePublished: "2023-05-15T00:00:00", dateReserved: "2023-03-30T00:00:00", dateUpdated: "2024-08-02T05:57:24.974Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24870
Vulnerability from cvelistv5
Published
2021-06-02 15:32
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/330 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-07 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:09.352Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/330", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d", }, { name: "GLSA-202208-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-07", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-10T05:09:46", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/330", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d", }, { name: "GLSA-202208-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202208-07", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-24870", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/330", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/330", }, { name: "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d", }, { name: "GLSA-202208-07", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-07", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24870", datePublished: "2021-06-02T15:32:11", dateReserved: "2020-08-28T00:00:00", dateUpdated: "2024-08-04T15:19:09.352Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-15503
Vulnerability from cvelistv5
Published
2020-07-02 00:00
Modified
2024-08-04 13:15
Severity ?
EPSS score ?
Summary
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T13:15:20.694Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.libraw.org/news/libraw-0-20-rc1", }, { tags: [ "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1", }, { tags: [ "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d", }, { name: "FEDORA-2020-f421eea477", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/", }, { name: "FEDORA-2020-f407db0e65", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/", }, { name: "FEDORA-2020-4f4c778096", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/", }, { name: "FEDORA-2020-07f0a49a9e", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/", }, { name: "openSUSE-SU-2020:1088", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html", }, { name: "openSUSE-SU-2020:1128", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html", }, { name: "FEDORA-2020-ed284fd64b", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/", }, { name: "FEDORA-2020-c6fa12cfb1", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/", }, { name: "[debian-lts-announce] 20221130 [SECURITY] [DLA 3214-1] libraw security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00042.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-30T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.libraw.org/news/libraw-0-20-rc1", }, { url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1", }, { url: "https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d", }, { name: "FEDORA-2020-f421eea477", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/", }, { name: "FEDORA-2020-f407db0e65", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/", }, { name: "FEDORA-2020-4f4c778096", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/", }, { name: "FEDORA-2020-07f0a49a9e", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/", }, { name: "openSUSE-SU-2020:1088", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html", }, { name: "openSUSE-SU-2020:1128", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html", }, { name: "FEDORA-2020-ed284fd64b", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/", }, { name: "FEDORA-2020-c6fa12cfb1", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/", }, { name: "[debian-lts-announce] 20221130 [SECURITY] [DLA 3214-1] libraw security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00042.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-15503", datePublished: "2020-07-02T00:00:00", dateReserved: "2020-07-02T00:00:00", dateUpdated: "2024-08-04T13:15:20.694Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5815
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/ | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://secuniaresearch.flexerasoftware.com/advisories/83507/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:56.115Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, { name: "83507", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.12", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An integer overflow error within the \"parse_qt()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through infinite loop", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, { name: "83507", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5815", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.12", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An integer overflow error within the \"parse_qt()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through infinite loop", }, ], }, ], }, references: { reference_data: [ { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, { name: "83507", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { name: "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5815", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:56.115Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5805
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/advisories/81000/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:3065 | vendor-advisory, x_refsource_REDHAT | |
https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:54.563Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.8", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "A boundary error within the \"quicktake_100_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through stack-based buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { name: "81000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5805", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.8", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A boundary error within the \"quicktake_100_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through stack-based buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "81000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "RHSA-2018:3065", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5805", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:54.563Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20365
Vulnerability from cvelistv5
Published
2018-12-22 17:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106299 | vdb-entry, x_refsource_BID | |
https://github.com/LibRaw/LibRaw/issues/195 | x_refsource_MISC | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.731Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106299", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106299", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/195", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-12-22T00:00:00", descriptions: [ { lang: "en", value: "LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106299", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106299", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/195", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20365", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106299", refsource: "BID", url: "http://www.securityfocus.com/bid/106299", }, { name: "https://github.com/LibRaw/LibRaw/issues/195", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/195", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20365", datePublished: "2018-12-22T17:00:00", dateReserved: "2018-12-22T00:00:00", dateUpdated: "2024-08-05T11:58:18.731Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5819
Vulnerability from cvelistv5
Published
2019-02-20 18:00
Modified
2024-09-17 04:29
Severity ?
EPSS score ?
Summary
An error within the "parse_sinar_ia()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | x_refsource_MISC | |
https://www.libraw.org/news/libraw-0-19-2-release | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Flexera Software LLC | LibRaw |
Version: 0.19.0 and earlier |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.378Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "Flexera Software LLC", versions: [ { status: "affected", version: "0.19.0 and earlier", }, ], }, ], datePublic: "2018-12-13T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"parse_sinar_ia()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) via CPU resource exhaustion", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", DATE_PUBLIC: "2018-12-13T00:00:00", ID: "CVE-2018-5819", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "0.19.0 and earlier", }, ], }, }, ], }, vendor_name: "Flexera Software LLC", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"parse_sinar_ia()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) via CPU resource exhaustion", }, ], }, ], }, references: { reference_data: [ { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { name: "https://www.libraw.org/news/libraw-0-19-2-release", refsource: "MISC", url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5819", datePublished: "2019-02-20T18:00:00Z", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-09-17T04:29:32.330Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-35534
Vulnerability from cvelistv5
Published
2022-09-01 17:54
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In LibRaw, there is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/279 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:02:08.125Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/279", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, ], descriptions: [ { lang: "en", value: "In LibRaw, there is a memory corruption vulnerability within the \"crxFreeSubbandData()\" function (libraw\\src\\decoders\\crx.cpp) when processing cr3 files.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-01T17:54:28", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/279", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2020-35534", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw, there is a memory corruption vulnerability within the \"crxFreeSubbandData()\" function (libraw\\src\\decoders\\crx.cpp) when processing cr3 files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/279", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/279", }, { name: "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2020-35534", datePublished: "2022-09-01T17:54:28", dateReserved: "2020-12-17T00:00:00", dateUpdated: "2024-08-04T17:02:08.125Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-16909
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/76000/ | third-party-advisory, x_refsource_SECUNIA | |
https://usn.ubuntu.com/3615-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:35:21.323Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { name: "76000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3615-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.6", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error related to the \"LibRaw::panasonic_load_raw()\" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through heap-based buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { name: "76000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3615-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2017-16909", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.6", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error related to the \"LibRaw::panasonic_load_raw()\" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through heap-based buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { name: "76000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { name: "USN-3615-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3615-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2017-16909", datePublished: "2018-12-07T22:00:00", dateReserved: "2017-11-21T00:00:00", dateUpdated: "2024-08-05T20:35:21.323Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5816
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An integer overflow error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/ | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://secuniaresearch.flexerasoftware.com/advisories/83507/ | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:56.117Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, { name: "83507", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.12", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An integer overflow error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through division by zero", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, { name: "83507", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5816", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.12", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An integer overflow error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through division by zero", }, ], }, ], }, references: { reference_data: [ { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { name: "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", }, { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, { name: "83507", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5816", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:56.117Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-35533
Vulnerability from cvelistv5
Published
2022-09-01 17:54
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading data from the image file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/273 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | mailing-list, x_refsource_MLIST |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:02:08.243Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/273", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, ], descriptions: [ { lang: "en", value: "In LibRaw, an out-of-bounds read vulnerability exists within the \"LibRaw::adobe_copy_pixel()\" function (libraw\\src\\decoders\\dng.cpp) when reading data from the image file.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-16T12:06:12", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/273", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2020-35533", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw, an out-of-bounds read vulnerability exists within the \"LibRaw::adobe_copy_pixel()\" function (libraw\\src\\decoders\\dng.cpp) when reading data from the image file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/273", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/273", }, { name: "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2020-35533", datePublished: "2022-09-01T17:54:32", dateReserved: "2020-12-17T00:00:00", dateUpdated: "2024-08-04T17:02:08.243Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-8366
Vulnerability from cvelistv5
Published
2020-01-14 15:19
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | x_refsource_MISC | |
http://www.libraw.org/news/libraw-0-17-1 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Nov/108 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:13:32.642Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-11-24T00:00:00", descriptions: [ { lang: "en", value: "Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-14T15:19:52", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, { tags: [ "x_refsource_MISC", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-8366", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { name: "http://www.libraw.org/news/libraw-0-17-1", refsource: "MISC", url: "http://www.libraw.org/news/libraw-0-17-1", }, { name: "http://seclists.org/fulldisclosure/2015/Nov/108", refsource: "MISC", url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-8366", datePublished: "2020-01-14T15:19:52", dateReserved: "2015-11-26T00:00:00", dateUpdated: "2024-08-06T08:13:32.642Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-15365
Vulnerability from cvelistv5
Published
2020-06-28 12:07
Modified
2024-08-04 13:15
Severity ?
EPSS score ?
Summary
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/issues/301 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T13:15:20.062Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/301", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-28T12:07:34", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/301", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-15365", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3", }, { name: "https://github.com/LibRaw/LibRaw/issues/301", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/301", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-15365", datePublished: "2020-06-28T12:07:34", dateReserved: "2020-06-28T00:00:00", dateUpdated: "2024-08-04T13:15:20.062Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6886
Vulnerability from cvelistv5
Published
2017-05-16 15:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
An error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251 | x_refsource_CONFIRM | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/98605 | vdb-entry, x_refsource_BID | |
https://secuniaresearch.flexerasoftware.com/advisories/75737/ | x_refsource_MISC | |
http://www.debian.org/security/2017/dsa-3950 | vendor-advisory, x_refsource_DEBIAN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:41:17.677Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/", }, { name: "98605", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98605", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { name: "DSA-3950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3950", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "LibRaw", versions: [ { status: "affected", version: "0.x prior to 0.18.2", }, ], }, ], datePublic: "2017-05-11T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-03T18:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/", }, { name: "98605", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98605", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { name: "DSA-3950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3950", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2017-6886", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "0.x prior to 0.18.2", }, ], }, }, ], }, vendor_name: "LibRaw", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/", }, { name: "98605", refsource: "BID", url: "http://www.securityfocus.com/bid/98605", }, { name: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { name: "DSA-3950", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3950", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2017-6886", datePublished: "2017-05-16T15:00:00", dateReserved: "2017-03-14T00:00:00", dateUpdated: "2024-08-05T15:41:17.677Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20363
Vulnerability from cvelistv5
Published
2018-12-22 17:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106299 | vdb-entry, x_refsource_BID | |
https://github.com/LibRaw/LibRaw/issues/193 | x_refsource_MISC | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:19.014Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106299", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106299", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/193", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-12-22T00:00:00", descriptions: [ { lang: "en", value: "LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106299", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106299", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/193", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20363", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106299", refsource: "BID", url: "http://www.securityfocus.com/bid/106299", }, { name: "https://github.com/LibRaw/LibRaw/issues/193", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/193", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20363", datePublished: "2018-12-22T17:00:00", dateReserved: "2018-12-22T00:00:00", dateUpdated: "2024-08-05T11:58:19.014Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5808
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "find_green()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/81800/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:54.565Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.9", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"find_green()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "Arbitrary code execution through stack-based buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-28T22:06:05", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5808", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.9", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"find_green()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Arbitrary code execution through stack-based buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "81800", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { name: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5808", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:54.565Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5818
Vulnerability from cvelistv5
Published
2019-02-20 18:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "parse_rollei()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | x_refsource_MISC | |
https://www.libraw.org/news/libraw-0-19-2-release | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.917Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-12-13T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"parse_rollei()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5818", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"parse_rollei()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { name: "https://www.libraw.org/news/libraw-0-19-2-release", refsource: "MISC", url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5818", datePublished: "2019-02-20T18:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.917Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24889
Vulnerability from cvelistv5
Published
2020-09-16 14:55
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/334 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202010-05 | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:09.415Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/334", }, { name: "GLSA-202010-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202010-05", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-20T12:06:41", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/334", }, { name: "GLSA-202010-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202010-05", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-24889", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/334", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/334", }, { name: "GLSA-202010-05", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202010-05", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24889", datePublished: "2020-09-16T14:55:44", dateReserved: "2020-08-28T00:00:00", dateUpdated: "2024-08-04T15:19:09.415Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5804
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
A type confusion error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a division by zero.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/advisories/81000/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/ | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.829Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.8", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "A type confusion error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a division by zero.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through division by zero", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-07T21:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { name: "81000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5804", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.8", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A type confusion error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a division by zero.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through division by zero", }, ], }, ], }, references: { reference_data: [ { name: "81000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5804", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.829Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5811
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/81800/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 | x_refsource_MISC | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:56.175Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.9", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"nikon_coolscan_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through out-of-bounds read memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5811", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.9", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"nikon_coolscan_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through out-of-bounds read memory access", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { name: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5811", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:56.175Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-1439
Vulnerability from cvelistv5
Published
2013-09-16 19:00
Modified
2024-08-06 15:04
Severity ?
EPSS score ?
Summary
The "faster LJPEG decoder" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2013/dsa-2748 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2013/08/29/3 | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T15:04:48.425Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-2748", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2013/dsa-2748", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad", }, { name: "[oss-security] 20130829 [notification] libraw: multiple denial of service vulnerabilities", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2013/08/29/3", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2013-08-29T00:00:00", descriptions: [ { lang: "en", value: "The \"faster LJPEG decoder\" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-11-15T10:00:00", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "DSA-2748", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2013/dsa-2748", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad", }, { name: "[oss-security] 20130829 [notification] libraw: multiple denial of service vulnerabilities", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2013/08/29/3", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2013-1439", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The \"faster LJPEG decoder\" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-2748", refsource: "DEBIAN", url: "http://www.debian.org/security/2013/dsa-2748", }, { name: "https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad", }, { name: "[oss-security] 20130829 [notification] libraw: multiple denial of service vulnerabilities", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2013/08/29/3", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2013-1439", datePublished: "2013-09-16T19:00:00", dateReserved: "2013-01-26T00:00:00", dateUpdated: "2024-08-06T15:04:48.425Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-10528
Vulnerability from cvelistv5
Published
2018-04-29 03:00
Modified
2024-08-05 07:39
Severity ?
EPSS score ?
Summary
An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/144 | x_refsource_MISC | |
https://usn.ubuntu.com/3639-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:39:08.013Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { name: "USN-3639-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3639-1/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-04-28T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-07T17:50:36", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { name: "USN-3639-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3639-1/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-10528", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/144", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/144", }, { name: "USN-3639-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3639-1/", }, { name: "https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-10528", datePublished: "2018-04-29T03:00:00", dateReserved: "2018-04-28T00:00:00", dateUpdated: "2024-08-05T07:39:08.013Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-35530
Vulnerability from cvelistv5
Published
2022-09-01 17:52
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/272 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | mailing-list, x_refsource_MLIST |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:02:08.174Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/272", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, ], descriptions: [ { lang: "en", value: "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-16T12:06:14", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/272", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2020-35530", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/272", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/272", }, { name: "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2020-35530", datePublished: "2022-09-01T17:52:13", dateReserved: "2020-12-17T00:00:00", dateUpdated: "2024-08-04T17:02:08.174Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5817
Vulnerability from cvelistv5
Published
2019-02-20 18:00
Modified
2024-09-16 19:15
Severity ?
EPSS score ?
Summary
A type confusion error within the "unpacked_load_raw()" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop.
References
▼ | URL | Tags |
---|---|---|
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | x_refsource_MISC | |
https://www.libraw.org/news/libraw-0-19-2-release | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3989-1/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Flexera Software LLC | LibRaw |
Version: 0.19.0 and prior |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.867Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3989-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "Flexera Software LLC", versions: [ { status: "affected", version: "0.19.0 and prior", }, ], }, ], datePublic: "2018-12-13T00:00:00", descriptions: [ { lang: "en", value: "A type confusion error within the \"unpacked_load_raw()\" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) via infinite loop", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-21T15:06:03", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3989-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", DATE_PUBLIC: "2018-12-13T00:00:00", ID: "CVE-2018-5817", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "0.19.0 and prior", }, ], }, }, ], }, vendor_name: "Flexera Software LLC", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A type confusion error within the \"unpacked_load_raw()\" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) via infinite loop", }, ], }, ], }, references: { reference_data: [ { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { name: "https://www.libraw.org/news/libraw-0-19-2-release", refsource: "MISC", url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "USN-3989-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3989-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5817", datePublished: "2019-02-20T18:00:00Z", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-09-16T19:15:52.663Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5810
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "rollei_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/81800/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 | x_refsource_MISC | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.407Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.9", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"rollei_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through heap-based buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5810", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.9", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"rollei_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through heap-based buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { name: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5810", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.407Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-35535
Vulnerability from cvelistv5
Published
2022-09-01 17:54
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In LibRaw, there is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/283 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:02:07.985Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/283", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, ], descriptions: [ { lang: "en", value: "In LibRaw, there is an out-of-bounds read vulnerability within the \"LibRaw::parseSonySRF()\" function (libraw\\src\\metadata\\sony.cpp) when processing srf files.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-01T17:54:23", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/283", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2020-35535", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw, there is an out-of-bounds read vulnerability within the \"LibRaw::parseSonySRF()\" function (libraw\\src\\metadata\\sony.cpp) when processing srf files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/283", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/283", }, { name: "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2020-35535", datePublished: "2022-09-01T17:54:23", dateReserved: "2020-12-17T00:00:00", dateUpdated: "2024-08-04T17:02:07.985Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-35532
Vulnerability from cvelistv5
Published
2022-09-01 17:51
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/271 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | mailing-list, x_refsource_MLIST |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:02:08.093Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/271", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, ], descriptions: [ { lang: "en", value: "In LibRaw, an out-of-bounds read vulnerability exists within the \"simple_decode_row()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-16T12:06:13", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/271", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2020-35532", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "LibRaw 0.21-Beta1, LibRaw 0.20.2, LibRaw 0.20.1, LibRaw 0.20.0, LibRaw 0.20-RC2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In LibRaw, an out-of-bounds read vulnerability exists within the \"simple_decode_row()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/271", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/271", }, { name: "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e", }, { name: "[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2020-35532", datePublished: "2022-09-01T17:51:59", dateReserved: "2020-12-17T00:00:00", dateUpdated: "2024-08-04T17:02:08.093Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-32142
Vulnerability from cvelistv5
Published
2023-02-17 00:00
Modified
2024-08-03 23:17
Severity ?
EPSS score ?
Summary
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T23:17:29.294Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/400", }, { tags: [ "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49", }, { tags: [ "x_transferred", ], url: "https://github.com/gtt1995", }, { tags: [ "x_transferred", ], url: "https://www.libraw.org/", }, { name: "FEDORA-2023-220878f1bf", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/", }, { name: "FEDORA-2023-be842ba7fb", tags: [ "vendor-advisory", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/", }, { name: "[debian-lts-announce] 20230527 [SECURITY] [DLA 3433-1] libraw security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { name: "DSA-5412", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5412", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-28T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/LibRaw/LibRaw/issues/400", }, { url: "https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49", }, { url: "https://github.com/gtt1995", }, { url: "https://www.libraw.org/", }, { name: "FEDORA-2023-220878f1bf", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/", }, { name: "FEDORA-2023-be842ba7fb", tags: [ "vendor-advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/", }, { name: "[debian-lts-announce] 20230527 [SECURITY] [DLA 3433-1] libraw security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { name: "DSA-5412", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2023/dsa-5412", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-32142", datePublished: "2023-02-17T00:00:00", dateReserved: "2021-05-07T00:00:00", dateUpdated: "2024-08-03T23:17:29.294Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5800
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/79000/ | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/104663 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2018:3065 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/3615-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST | |
https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:54.579Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "104663", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104663", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.7", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An off-by-one error within the \"LibRaw::kodak_ycbcr_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through heap-based buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-10-21T14:21:50", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "104663", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104663", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5800", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.7", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An off-by-one error within the \"LibRaw::kodak_ycbcr_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through heap-based buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "104663", refsource: "BID", url: "http://www.securityfocus.com/bid/104663", }, { name: "RHSA-2018:3065", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { name: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5800", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:54.579Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-10529
Vulnerability from cvelistv5
Published
2018-04-29 03:00
Modified
2024-08-05 07:39
Severity ?
EPSS score ?
Summary
An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/144 | x_refsource_MISC | |
https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c | x_refsource_MISC | |
https://usn.ubuntu.com/3639-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:39:08.384Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c", }, { name: "USN-3639-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3639-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-04-28T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-05-09T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c", }, { name: "USN-3639-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3639-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-10529", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/144", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/issues/144", }, { name: "https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c", }, { name: "USN-3639-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3639-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-10529", datePublished: "2018-04-29T03:00:00", dateReserved: "2018-04-28T00:00:00", dateUpdated: "2024-08-05T07:39:08.384Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5801
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "LibRaw::unpack()" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/79000/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914 | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2018:3065 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/3615-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.835Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.7", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"LibRaw::unpack()\" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through NULL pointer dereference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-28T22:06:04", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914", }, { name: "RHSA-2018:3065", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5801", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.7", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"LibRaw::unpack()\" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through NULL pointer dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { name: "79000", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { name: "https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914", }, { name: "RHSA-2018:3065", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { name: "USN-3615-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3615-1/", }, { name: "[debian-lts-announce] 20190328 [SECURITY] [DLA 1734-1] libraw security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5801", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.835Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-5807
Vulnerability from cvelistv5
Published
2018-12-07 22:00
Modified
2024-08-05 05:47
Severity ?
EPSS score ?
Summary
An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/81800/ | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 | x_refsource_MISC | |
https://usn.ubuntu.com/3838-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:47:55.522Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3838-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "n/a", versions: [ { status: "affected", version: "Prior to 0.18.9", }, ], }, ], datePublic: "2018-12-07T00:00:00", descriptions: [ { lang: "en", value: "An error within the \"samsung_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service) through out-of-bounds read memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-12-08T10:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3838-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2018-5807", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "Prior to 0.18.9", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An error within the \"samsung_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS (Denial of Service) through out-of-bounds read memory access", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { name: "81800", refsource: "SECUNIA", url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { name: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { name: "USN-3838-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3838-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2018-5807", datePublished: "2018-12-07T22:00:00", dateReserved: "2018-01-19T00:00:00", dateUpdated: "2024-08-05T05:47:55.522Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-22628
Vulnerability from cvelistv5
Published
2023-08-22 00:00
Modified
2024-10-03 18:04
Severity ?
EPSS score ?
Summary
Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T14:51:11.044Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/269", }, { name: "[debian-lts-announce] 20230910 [SECURITY] [DLA 3560-1] libraw security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-22628", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-03T18:03:55.537600Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-03T18:04:08.106Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\\src\\postprocessing\\aspect_ratio.cpp.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-10T16:06:10.571951", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/LibRaw/LibRaw/issues/269", }, { name: "[debian-lts-announce] 20230910 [SECURITY] [DLA 3560-1] libraw security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-22628", datePublished: "2023-08-22T00:00:00", dateReserved: "2020-08-13T00:00:00", dateUpdated: "2024-10-03T18:04:08.106Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-6887
Vulnerability from cvelistv5
Published
2017-05-16 15:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98592 | vdb-entry, x_refsource_BID | |
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/ | x_refsource_MISC | |
https://secuniaresearch.flexerasoftware.com/advisories/75737/ | x_refsource_MISC | |
http://www.debian.org/security/2017/dsa-3950 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:41:17.692Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "98592", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98592", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { name: "DSA-3950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3950", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LibRaw", vendor: "LibRaw", versions: [ { status: "affected", version: "0.x prior to 0.18.2", }, ], }, ], datePublic: "2017-05-11T00:00:00", descriptions: [ { lang: "en", value: "A boundary error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to \"DSLR-A100\" and containing multiple sequences of 0x100 and 0x14A TAGs.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Corruption, System Compromise and Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-03T18:57:01", orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", shortName: "flexera", }, references: [ { name: "98592", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98592", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/", }, { tags: [ "x_refsource_MISC", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { name: "DSA-3950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3950", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "PSIRT-CNA@flexerasoftware.com", ID: "CVE-2017-6887", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LibRaw", version: { version_data: [ { version_value: "0.x prior to 0.18.2", }, ], }, }, ], }, vendor_name: "LibRaw", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A boundary error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to \"DSLR-A100\" and containing multiple sequences of 0x100 and 0x14A TAGs.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Corruption, System Compromise and Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "98592", refsource: "BID", url: "http://www.securityfocus.com/bid/98592", }, { name: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/", }, { name: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", refsource: "MISC", url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { name: "DSA-3950", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3950", }, { name: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", refsource: "MISC", url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab", assignerShortName: "flexera", cveId: "CVE-2017-6887", datePublished: "2017-05-16T15:00:00", dateReserved: "2017-03-14T00:00:00", dateUpdated: "2024-08-05T15:41:17.692Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-14265
Vulnerability from cvelistv5
Published
2017-09-11 09:00
Modified
2024-08-05 19:20
Severity ?
EPSS score ?
Summary
A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.
References
▼ | URL | Tags |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/99 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:20:41.411Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/LibRaw/LibRaw/issues/99", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-09-11T00:00:00", descriptions: [ { lang: "en", value: "A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-11T08:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/LibRaw/LibRaw/issues/99", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-14265", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/LibRaw/LibRaw/issues/99", refsource: "CONFIRM", url: "https://github.com/LibRaw/LibRaw/issues/99", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-14265", datePublished: "2017-09-11T09:00:00", dateReserved: "2017-09-11T00:00:00", dateUpdated: "2024-08-05T19:20:41.411Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2017-09-12 19:29
Modified
2024-11-21 03:12
Severity ?
Summary
LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/100866 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/100 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100866 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/100 | Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "59C927CB-58E1-481D-9A4C-CCECD597E486", versionEndIncluding: "0.18.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.", }, { lang: "es", value: "LibRaw en versiones anteriores a la 0.18.4 tiene un desbordamiento de búfer basado en memoria dinámica (heap) en la función processCanonCameraInfo mediante un archivo manipulado.", }, ], id: "CVE-2017-14348", lastModified: "2024-11-21T03:12:37.187", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-12T19:29:00.250", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100866", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/100", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/100866", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/100", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8B6F1A-93CA-4AE5-8A1A-FBD6D4CFA400", versionEndExcluding: "0.18.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"LibRaw::parse_exif()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.", }, { lang: "es", value: "Un error en la función \"LibRaw::parse_exif()\" (internal/dcraw_common.cpp) en las versiones anteriores a la 0.18.9 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en pila y la ejecución de código arbitrario.", }, ], id: "CVE-2018-5809", lastModified: "2024-11-21T04:09:27.167", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.147", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2013-08-14 15:55
Modified
2024-11-21 01:51
Severity ?
Summary
Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "E88EF7D9-1B57-4417-91F6-1E5EA29703DE", versionEndIncluding: "0.15.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.", }, { lang: "es", value: "Desbordamiento de búfer en el código de corrección de la exposición en LibRaw anterior a v0.15.1 permite a atacantes, dependiendo del contexto, provocar una denegación de servicio (caída) y posiblemente la ejecución de código de su elección a través de vectores no especificados.", }, ], id: "CVE-2013-2127", lastModified: "2024-11-21T01:51:05.447", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-08-14T15:55:06.973", references: [ { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53547", }, { source: "secalert@redhat.com", url: "http://www.libraw.org/news/libraw-0-15-1", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53547", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.libraw.org/news/libraw-0-15-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-01 18:15
Modified
2024-11-21 05:27
Severity ?
Summary
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68 | Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/LibRaw/LibRaw/issues/270 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/270 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", matchCriteriaId: "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", matchCriteriaId: "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", matchCriteriaId: "8269B02E-558F-4AA5-9EEA-87226A3D1816", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", matchCriteriaId: "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", matchCriteriaId: "36C296E2-1899-457B-9EB2-916A33E383C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\\src\\x3f\\x3f_utils_patched.cpp) when reading data from an image file.", }, { lang: "es", value: "En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función get_huffman_diff() (libraw\\src\\x3f\\x3f_utils_patched.cpp) cuando son leídos datos de un archivo de imagen", }, ], id: "CVE-2020-35531", lastModified: "2024-11-21T05:27:30.597", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-01T18:15:08.820", references: [ { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/270", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/270", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 03:17
Severity ?
Summary
An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "036305D4-5201-467D-8C37-BB46FE267729", versionEndExcluding: "0.18.6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error related to the \"LibRaw::panasonic_load_raw()\" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.", }, { lang: "es", value: "Un error relacionado con la función \"LibRaw::panasonic_load_raw()\" (dcraw_common.cpp) en las versiones anteriores a la 0.18.6 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en memoria dinámica (heap) y un cierre inesperado mediante una imagen TIFF especialmente manipulada.", }, ], id: "CVE-2017-16909", lastModified: "2024-11-21T03:17:13.593", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.240", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "EA819682-72D6-41E2-86F3-4C6E379E7B96", versionEndExcluding: "0.18.11", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"parse_minolta()\" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.", }, { lang: "es", value: "Un error en la función \"parse_minolta()\" (dcraw/dcraw.c) en LibRaw, en versiones anteriores a la 0.18.11, puede explotarse para provocar un bucle infinito mediante un archivo especialmente manipulado.", }, ], id: "CVE-2018-5813", lastModified: "2024-11-21T04:09:27.680", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.520", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83050/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83050/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-13/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-835", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-16 16:29
Modified
2024-11-21 03:30
Severity ?
Summary
An error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "54CB3A8F-1F07-49F4-AC34-9199D0EA24AF", versionEndIncluding: "0.18.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.", }, { lang: "es", value: "Un fallo dentro de la función \\\"parse_tiff_ifd()\\\" (internal/dcraw_common.cpp) en las versiones de LibRaw anteriores a la 0.18.2 podría explotarse para corromper la memoria.", }, ], id: "CVE-2017-6886", lastModified: "2024-11-21T03:30:43.630", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-16T16:29:00.220", references: [ { source: "PSIRT-CNA@flexerasoftware.com", url: "http://www.debian.org/security/2017/dsa-3950", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/98605", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2017/dsa-3950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/98605", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-5/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-05-15 22:15
Modified
2024-11-21 07:39
Severity ?
Summary
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
fedoraproject | fedora | 37 | |
fedoraproject | fedora | 38 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "0218F3FC-B5F8-4B58-AB04-834FAA1BED12", versionEndExcluding: "0.21.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.", }, ], id: "CVE-2023-1729", lastModified: "2024-11-21T07:39:46.890", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-15T22:15:10.350", references: [ { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188240", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/557", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202312-08", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5412", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2188240", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/557", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202312-08", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5412", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Undergoing Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-01 18:15
Modified
2024-11-21 05:27
Severity ?
Summary
In LibRaw, there is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8 | Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/LibRaw/LibRaw/issues/279 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/279 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", matchCriteriaId: "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", matchCriteriaId: "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", matchCriteriaId: "8269B02E-558F-4AA5-9EEA-87226A3D1816", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", matchCriteriaId: "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", matchCriteriaId: "36C296E2-1899-457B-9EB2-916A33E383C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw, there is a memory corruption vulnerability within the \"crxFreeSubbandData()\" function (libraw\\src\\decoders\\crx.cpp) when processing cr3 files.", }, { lang: "es", value: "En LibRaw, se presenta una vulnerabilidad de corrupción de memoria en la función \"crxFreeSubbandData()\" (libraw\\src\\decoders\\crx.cpp) cuando son procesados archivos cr3", }, ], id: "CVE-2020-35534", lastModified: "2024-11-21T05:27:31.093", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-01T18:15:08.970", references: [ { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/279", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/279", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-02 16:15
Modified
2024-11-21 05:16
Severity ?
Summary
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/330 | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/202208-07 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/330 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-07 | Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "496898A6-5B52-4DDA-8671-83014BAD5FC5", versionEndExcluding: "0.20.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.", }, { lang: "es", value: "Libraw versiones anteriores a 0.20.1, tiene un desbordamiento del búfer de lapila por medio de la función LibRaw::identify_process_dng_fields en el archivo identify.cpp", }, ], id: "CVE-2020-24870", lastModified: "2024-11-21T05:16:09.110", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-02T16:15:08.287", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/330", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-07", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/330", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-07", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-16 15:15
Modified
2024-11-21 05:16
Severity ?
Summary
libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:*:*:*:*:*:*:*", matchCriteriaId: "3D26C9C4-BD7A-454F-96B3-06D1EFC4A5C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [ { sourceIdentifier: "cve@mitre.org", tags: [ "disputed", ], }, ], descriptions: [ { lang: "en", value: "libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way", }, { lang: "es", value: "** EN DISPUTA ** libraw versión 20.0, presenta una vulnerabilidad de desreferencia del puntero null en la función parse_tiff_ifd en el archivo src/metadata/tiff.cpp, que puede resultar en una ejecución de código arbitraria dependiendo del contexto. Nota: esta vulnerabilidad sólo se produce si se compila el software de cierta manera", }, ], id: "CVE-2020-24890", lastModified: "2024-11-21T05:16:10.227", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-16T15:15:12.603", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/335", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/202010-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/335", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/202010-05", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-02 14:15
Modified
2024-11-21 05:05
Severity ?
Summary
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
libraw | libraw | 0.20 | |
libraw | libraw | 0.20 | |
libraw | libraw | 0.20 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
debian | debian_linux | 10.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "27DFF8C5-9D6E-46BE-AC83-B1CFA0EC18E9", versionEndIncluding: "0.19.5", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20:beta1:*:*:*:*:*:*", matchCriteriaId: "4692451F-ECE5-4545-ACB7-C6F0442C2531", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20:beta2:*:*:*:*:*:*", matchCriteriaId: "D7AB8396-4358-4095-AA9F-992A661C48E0", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20:beta3:*:*:*:*:*:*", matchCriteriaId: "91AB2B37-1EF7-4A77-86B8-122D7719D234", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", matchCriteriaId: "36D96259-24BD-44E2-96D9-78CE1D41F956", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.", }, { lang: "es", value: "LibRaw versiones anteriores a 0.20-RC1, carece de una comprobación de rango de tamaño de miniaturas. Esto afecta a los archivos decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, y utils/thumb_utils.cpp. Por ejemplo, malloc(sizeof(libraw_processed_image_t)+T.tlength) ocurre sin comprobar T.tlength", }, ], id: "CVE-2020-15503", lastModified: "2024-11-21T05:05:39.190", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-02T14:15:11.683", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00042.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "https://www.libraw.org/news/libraw-0-20-rc1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00042.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "https://www.libraw.org/news/libraw-0-20-rc1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2013-09-16 19:14
Modified
2024-11-21 01:49
Severity ?
Summary
The "faster LJPEG decoder" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | 0.13.0 | |
libraw | libraw | 0.13.1 | |
libraw | libraw | 0.13.2 | |
libraw | libraw | 0.13.3 | |
libraw | libraw | 0.13.4 | |
libraw | libraw | 0.13.5 | |
libraw | libraw | 0.13.6 | |
libraw | libraw | 0.13.7 | |
libraw | libraw | 0.13.8 | |
libraw | libraw | 0.14.0 | |
libraw | libraw | 0.14.1 | |
libraw | libraw | 0.14.2 | |
libraw | libraw | 0.14.3 | |
libraw | libraw | 0.14.4 | |
libraw | libraw | 0.14.5 | |
libraw | libraw | 0.14.6 | |
libraw | libraw | 0.14.7 | |
libraw | libraw | 0.15.0 | |
libraw | libraw | 0.15.1 | |
libraw | libraw | 0.15.2 | |
libraw | libraw | 0.15.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.13.0:*:*:*:*:*:*:*", matchCriteriaId: "41959708-2D95-472D-B845-40EC10C51ACE", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.1:*:*:*:*:*:*:*", matchCriteriaId: "03492249-E4F2-4696-AE8A-7111E3834490", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.2:*:*:*:*:*:*:*", matchCriteriaId: "8939A79E-5B9C-4389-9CEA-752899C4AAE9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.3:*:*:*:*:*:*:*", matchCriteriaId: "0B566274-96B5-4966-9ECA-F78DBB8F0DFD", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.4:*:*:*:*:*:*:*", matchCriteriaId: "1C1C9DE3-EEFF-4C10-8212-1BDFAF900204", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.5:*:*:*:*:*:*:*", matchCriteriaId: "3DA5937A-9559-4A3D-B550-05512F639B89", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.6:*:*:*:*:*:*:*", matchCriteriaId: "93912D7A-FE0B-4ACE-9F96-64D6F0EDE5C9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.7:*:*:*:*:*:*:*", matchCriteriaId: "9F3DBCCD-AC9F-4DAE-A6B2-13BA32F2575A", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.13.8:*:*:*:*:*:*:*", matchCriteriaId: "CA950266-7B17-4A01-B879-6DC30F793608", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.0:*:*:*:*:*:*:*", matchCriteriaId: "98C296C8-D525-4847-AA59-8CC46719D92E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.1:*:*:*:*:*:*:*", matchCriteriaId: "1DFCCA04-3EED-48C5-9C70-7D3F0003C0D6", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.2:*:*:*:*:*:*:*", matchCriteriaId: "8A74AA57-4D88-4DF0-85A9-E7D6D1CEFF00", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.3:*:*:*:*:*:*:*", matchCriteriaId: "69FEC106-AC7E-4ED9-8963-3FD4817EC56B", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.4:*:*:*:*:*:*:*", matchCriteriaId: "05EEAF87-8CCE-48EC-86E7-EE28329D2A9D", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.5:*:*:*:*:*:*:*", matchCriteriaId: "D054474D-5C98-4797-9C15-217B8EBD55EA", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.6:*:*:*:*:*:*:*", matchCriteriaId: "333AFB23-DC69-4612-8C6D-097617993561", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.14.7:*:*:*:*:*:*:*", matchCriteriaId: "4BD3FC3C-52B7-45C6-84E6-6574767B2C72", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.15.0:*:*:*:*:*:*:*", matchCriteriaId: "25844B56-0F72-4FAA-9179-19659142A8C2", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.15.1:*:*:*:*:*:*:*", matchCriteriaId: "36D20992-4F53-4BBF-8CF8-C3128F07EAB6", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.15.2:*:*:*:*:*:*:*", matchCriteriaId: "1C98A25F-7E97-4FE9-86B6-C281AE330D8C", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.15.3:*:*:*:*:*:*:*", matchCriteriaId: "3E52EC30-160B-4095-A269-DA8B7F0A11AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The \"faster LJPEG decoder\" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file.", }, { lang: "es", value: "El \"faster LJPEG decoder\" en libraw versiones 0.13.x, 0.14.x, y versiones 0.15.x anteriores a 0.15.4, permite a los atacantes dependiendo del contexto causar una denegación de servicio (desreferencia de un puntero NULL) por medio de un archivo de fotos diseñado.", }, ], id: "CVE-2013-1439", lastModified: "2024-11-21T01:49:35.077", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2013-09-16T19:14:37.693", references: [ { source: "security@debian.org", url: "http://www.debian.org/security/2013/dsa-2748", }, { source: "security@debian.org", tags: [ "Exploit", "Patch", ], url: "http://www.openwall.com/lists/oss-security/2013/08/29/3", }, { source: "security@debian.org", tags: [ "Exploit", "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2013/dsa-2748", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "http://www.openwall.com/lists/oss-security/2013/08/29/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad", }, ], sourceIdentifier: "security@debian.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "AD58177D-D7FB-4B22-8E44-ED04AC0679DE", versionEndExcluding: "0.18.8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A boundary error within the \"quicktake_100_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.", }, { lang: "es", value: "Un error de límites en la función \"quicktake_100_load_raw()\" (internal/dcraw_common.cpp) en las versiones anteriores a la 0.18.8 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en pila y un cierre inesperado.", }, ], id: "CVE-2018-5805", lastModified: "2024-11-21T04:09:26.673", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.787", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-22 17:29
Modified
2024-11-21 04:01
Severity ?
Summary
LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106299 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/193 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106299 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/193 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "B036F248-BF46-4CB7-B574-B091ACBE5EAF", versionEndIncluding: "0.19.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.", }, { lang: "es", value: "LibRaw::raw2image en libraw_cxx.cpp en LibRaw 0.19.1 tiene una desreferencia de puntero NULL.", }, ], id: "CVE-2018-20363", lastModified: "2024-11-21T04:01:19.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-22T17:29:00.223", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106299", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/193", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106299", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/193", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-29 03:29
Modified
2024-11-21 03:41
Severity ?
Summary
An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3 | Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/144 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3639-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/144 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3639-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
libraw | libraw | 0.18.9 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*", matchCriteriaId: "7E0EC812-F04B-4671-B565-1B48A368C85F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.", }, { lang: "es", value: "Se ha descubierto un problema en LibRaw 0.18.9. Existe un desbordamiento de búfer basado en pila en la función utf2char de libraw_cxx.cpp.", }, ], id: "CVE-2018-10528", lastModified: "2024-11-21T03:41:30.043", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-29T03:29:00.310", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3639-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3639-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "find_green()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8B6F1A-93CA-4AE5-8A1A-FBD6D4CFA400", versionEndExcluding: "0.18.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"find_green()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.", }, { lang: "es", value: "Un error en la función \"find_green()\" (internal/dcraw_common.cpp) en las versiones anteriores a la 0.18.9 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en pila y la ejecución de código arbitrario.", }, ], id: "CVE-2018-5808", lastModified: "2024-11-21T04:09:27.043", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.053", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-08-29 06:29
Modified
2024-11-21 03:11
Severity ?
Summary
There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1483988 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1483988 | Issue Tracking, Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.18.2:*:*:*:*:*:*:*", matchCriteriaId: "DD276716-465E-4BE7-AF47-C789A06D97EC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.", }, { lang: "es", value: "Existe una excepción de punto flotante en la función kodak_radc_load_raw en dcraw_common.cpp en LibRaw 0.18.2. Esto podría permitir que se realice un ataque de denegación de servicio remoto.", }, ], id: "CVE-2017-13735", lastModified: "2024-11-21T03:11:32.990", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-08-29T06:29:00.547", references: [ { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1483988", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1483988", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8B6F1A-93CA-4AE5-8A1A-FBD6D4CFA400", versionEndExcluding: "0.18.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"nikon_coolscan_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference.", }, { lang: "es", value: "Un error en la función \"nikon_coolscan_load_raw()\" (internal/dcraw_common.cpp) en LibRaw, en versiones anteriores a la 0.18.9, puede explotarse para desencadenar una desreferencia de puntero NULL.", }, ], id: "CVE-2018-5812", lastModified: "2024-11-21T04:09:27.557", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.427", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "64A19E0C-8BED-4BFA-9287-9EB1EB760BB3", versionEndExcluding: "0.18.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An off-by-one error within the \"LibRaw::kodak_ycbcr_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.", }, { lang: "es", value: "Un error por un paso relacionado con la función \"LibRaw::kodak_ycbcr_load_raw()\" (internal/dcraw_common.cpp) en las versiones anteriores a la 0.18.7 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en memoria dinámica (heap) y un cierre inesperado.", }, ], id: "CVE-2018-5800", lastModified: "2024-11-21T04:09:25.927", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.443", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104663", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104663", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-193", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-01-14 16:15
Modified
2024-11-21 02:38
Severity ?
Summary
The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2015/Nov/108 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.libraw.org/news/libraw-0-17-1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2015/Nov/108 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.libraw.org/news/libraw-0-17-1 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "39C71F1D-C4CE-49BE-B293-DC2DADDF13C7", versionEndExcluding: "0.17.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.", }, { lang: "es", value: "La función phase_one_correct en Libraw versiones anteriores a 0.17.1, permite a atacantes causar errores de memoria y posiblemente ejecutar código arbitrario, relacionado con la inicialización de objetos de memoria.", }, ], id: "CVE-2015-8367", lastModified: "2024-11-21T02:38:22.983", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-14T16:15:11.667", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-665", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2013-08-14 15:55
Modified
2024-11-21 01:51
Severity ?
Summary
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
libraw | libraw | 0.15.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.04 | |
opensuse | opensuse | 12.2 | |
opensuse | opensuse | 12.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "9703F8F1-AE57-4D92-A896-8815B4CAD30B", versionEndIncluding: "0.15.1", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.15.0:*:*:*:*:*:*:*", matchCriteriaId: "25844B56-0F72-4FAA-9179-19659142A8C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", matchCriteriaId: "F5D324C4-97C7-49D3-A809-9EAD4B690C69", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", matchCriteriaId: "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", matchCriteriaId: "D806A17E-B8F9-466D-807D-3F1E77603DC8", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.", }, { lang: "es", value: "Múltiples vulnerabilidades de doble liberación en la función LibRaw::unpack en libraw_cxx.cpp en LibRaw anterior a v0.15.2, permite a atacantes, dependiendo del contexto, provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código arbitrario a través de un fichero malformado a todo color (1) Foveon o (2) imagen sRAW.", }, ], id: "CVE-2013-2126", lastModified: "2024-11-21T01:51:05.283", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-08-14T15:55:06.920", references: [ { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html", }, { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53547", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53883", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53888", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/53938", }, { source: "secalert@redhat.com", url: "http://www.libraw.org/news/libraw-0-15-2", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2013/06/10/1", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/USN-1884-1", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/USN-1885-1", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53547", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53883", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/53888", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/53938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.libraw.org/news/libraw-0-15-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2013/05/29/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2013/06/10/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-1884-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-1885-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "64A19E0C-8BED-4BFA-9287-9EB1EB760BB3", versionEndExcluding: "0.18.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"kodak_radc_load_raw()\" function (internal/dcraw_common.cpp) related to the \"buf\" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, { lang: "es", value: "Un error en la función \"kodak_radc_load_raw()\" (internal/dcraw_common.cpp) relacionada con la variable \"buf\" en LibRaw en versiones anteriores a la 0.18.7 se puede explotar para provocar un acceso de lectura a la memoria fuera de límites y un cierre inesperado.", }, ], id: "CVE-2018-5802", lastModified: "2024-11-21T04:09:26.223", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.600", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
A type confusion error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a division by zero.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "AD58177D-D7FB-4B22-8E44-ED04AC0679DE", versionEndExcluding: "0.18.8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A type confusion error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a division by zero.", }, { lang: "es", value: "Un error de confusión de tipos en la función \"identify()\" (internal/dcraw_common.cpp) en LibRaw, en versiones anteriores a la 0.18.8, puede explotarse para desencadenar una división entre cero.", }, ], id: "CVE-2018-5804", lastModified: "2024-11-21T04:09:26.550", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.693", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-369", }, { lang: "en", value: "CWE-704", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-02-17 18:15
Modified
2024-11-21 06:06
Severity ?
Summary
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:*:*:*:*:*:*:*", matchCriteriaId: "3D26C9C4-BD7A-454F-96B3-06D1EFC4A5C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.", }, ], id: "CVE-2021-32142", lastModified: "2024-11-21T06:06:52.553", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-17T18:15:10.860", references: [ { source: "cve@mitre.org", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", ], url: "https://github.com/LibRaw/LibRaw/issues/400", }, { source: "cve@mitre.org", tags: [ "Not Applicable", ], url: "https://github.com/gtt1995", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/", }, { source: "cve@mitre.org", url: "https://www.debian.org/security/2023/dsa-5412", }, { source: "cve@mitre.org", tags: [ "Product", ], url: "https://www.libraw.org/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", ], url: "https://github.com/LibRaw/LibRaw/issues/400", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "https://github.com/gtt1995", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2023/dsa-5412", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Product", ], url: "https://www.libraw.org/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-01 18:15
Modified
2024-11-21 05:27
Severity ?
Summary
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb | Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/LibRaw/LibRaw/issues/272 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/272 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", matchCriteriaId: "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", matchCriteriaId: "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", matchCriteriaId: "8269B02E-558F-4AA5-9EEA-87226A3D1816", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", matchCriteriaId: "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", matchCriteriaId: "36C296E2-1899-457B-9EB2-916A33E383C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw, there is an out-of-bounds write vulnerability within the \"new_node()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.", }, { lang: "es", value: "En LibRaw, se presenta una vulnerabilidad de escritura fuera de límites en la función \"new_node()\" (libraw\\src\\x3f\\x3f_utils_patched.cpp) que puede desencadenarse por medio de un archivo X3F diseñado", }, ], id: "CVE-2020-35530", lastModified: "2024-11-21T05:27:30.420", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-01T18:15:08.770", references: [ { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/272", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/272", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-20 18:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "parse_sinar_ia()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | Mailing List, Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | https://usn.ubuntu.com/3989-1/ | ||
PSIRT-CNA@flexerasoftware.com | https://www.libraw.org/news/libraw-0-19-2-release | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.libraw.org/news/libraw-0-19-2-release | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "B880BEC0-DCE2-4F83-A203-020D00B2F17E", versionEndExcluding: "0.19.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"parse_sinar_ia()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust available CPU resources.", }, { lang: "es", value: "Un error en la función \"parse_sinar_ia()\" (internal/dcraw_common.cpp), en las versiones de LibRaw anteriores a la 0.19.1, podría explotarse para agotar los recursos de la CPU disponibles.", }, ], id: "CVE-2018-5819", lastModified: "2024-11-21T04:09:28.467", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-20T18:29:00.757", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { source: "PSIRT-CNA@flexerasoftware.com", url: "https://usn.ubuntu.com/3989-1/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "rollei_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8B6F1A-93CA-4AE5-8A1A-FBD6D4CFA400", versionEndExcluding: "0.18.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"rollei_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.", }, { lang: "es", value: "Un error en la función \"rollei_load_raw()\" (internal/dcraw_common.cpp) en las versiones anteriores a la 0.18.9 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en memoria dinámica (heap) y un cierre inesperado.", }, ], id: "CVE-2018-5810", lastModified: "2024-11-21T04:09:27.290", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.240", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8B6F1A-93CA-4AE5-8A1A-FBD6D4CFA400", versionEndExcluding: "0.18.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"nikon_coolscan_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, { lang: "es", value: "Un error en la función \"nikon_coolscan_load_raw()\" (internal/dcraw_common.cpp) en LibRaw en versiones anteriores a la 0.18.9 se puede explotar para provocar un acceso de lectura a la memoria fuera de límites y un cierre inesperado.", }, ], id: "CVE-2018-5811", lastModified: "2024-11-21T04:09:27.420", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.333", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "leaf_hdr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "AD58177D-D7FB-4B22-8E44-ED04AC0679DE", versionEndExcluding: "0.18.8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"leaf_hdr_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.", }, { lang: "es", value: "Un error en la función \"leaf_hdr_load_raw()\" (internal/dcraw_common.cpp) en LibRaw, en versiones anteriores a la 0.18.8, puede explotarse para desencadenar una desreferencia de puntero NULL.", }, ], id: "CVE-2018-5806", lastModified: "2024-11-21T04:09:26.793", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.880", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-21 09:29
Modified
2024-11-21 04:01
Severity ?
Summary
There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/192 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/192 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.19.1:*:*:*:*:*:*:*", matchCriteriaId: "A480D1FB-E6A3-4D1E-AC5C-D14A8CBD0F9E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.", }, { lang: "es", value: "Existe un desbordamiento de búfer basado en pila en la función parse_makernote de dcraw_common.cpp en la versión 0.19.1 de LibRaw. Se podría realizar un ataque de denegación de servicio u otro tipo de impacto sin especificar con una entrada especialmente manipulada.", }, ], id: "CVE-2018-20337", lastModified: "2024-11-21T04:01:15.967", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-21T09:29:00.373", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/192", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/192", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-01 18:15
Modified
2024-11-21 05:27
Severity ?
Summary
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e | Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/LibRaw/LibRaw/issues/271 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/271 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", matchCriteriaId: "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", matchCriteriaId: "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", matchCriteriaId: "8269B02E-558F-4AA5-9EEA-87226A3D1816", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", matchCriteriaId: "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", matchCriteriaId: "36C296E2-1899-457B-9EB2-916A33E383C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw, an out-of-bounds read vulnerability exists within the \"simple_decode_row()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.", }, { lang: "es", value: "En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función \"simple_decode_row()\" (libraw\\src\\x3f\\x3f_utils_patched.cpp) que puede desencadenarse por medio de una imagen con un campo row_stride grande", }, ], id: "CVE-2020-35532", lastModified: "2024-11-21T05:27:30.763", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-01T18:15:08.870", references: [ { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/271", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/271", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-01-14 16:15
Modified
2024-11-21 02:38
Severity ?
Summary
Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2015/Nov/108 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.libraw.org/news/libraw-0-17-1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2015/Nov/108 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.libraw.org/news/libraw-0-17-1 | Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "39C71F1D-C4CE-49BE-B293-DC2DADDF13C7", versionEndExcluding: "0.17.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.", }, { lang: "es", value: "Un error de índice de matriz en la función smal_decode_segment en LibRaw versiones anteriores a 0.17.1, permite a atacantes dependiendo del contexto causar errores de memoria y posiblemente ejecutar código arbitrario por medio de vectores relacionados con índices.", }, ], id: "CVE-2015-8366", lastModified: "2024-11-21T02:38:22.847", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-14T16:15:11.590", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2015/Nov/108", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.libraw.org/news/libraw-0-17-1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-129", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-20 18:29
Modified
2024-11-21 04:09
Severity ?
Summary
A type confusion error within the "unpacked_load_raw()" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | Mailing List, Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | https://usn.ubuntu.com/3989-1/ | ||
PSIRT-CNA@flexerasoftware.com | https://www.libraw.org/news/libraw-0-19-2-release | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.libraw.org/news/libraw-0-19-2-release | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "B880BEC0-DCE2-4F83-A203-020D00B2F17E", versionEndExcluding: "0.19.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A type confusion error within the \"unpacked_load_raw()\" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop.", }, { lang: "es", value: "Un error de confusión de tipos en la función \"unpacked_load_raw()\" en LibRaw, en versiones anteriores a la 0.19.1 (internal/dcraw_common.cpp), puede ser explotado para desencadenar un bucle infinito.", }, ], id: "CVE-2018-5817", lastModified: "2024-11-21T04:09:28.210", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-20T18:29:00.633", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { source: "PSIRT-CNA@flexerasoftware.com", url: "https://usn.ubuntu.com/3989-1/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-704", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-20 18:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "parse_rollei()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | Mailing List, Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | https://usn.ubuntu.com/3989-1/ | ||
PSIRT-CNA@flexerasoftware.com | https://www.libraw.org/news/libraw-0-19-2-release | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.libraw.org/news/libraw-0-19-2-release | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "B880BEC0-DCE2-4F83-A203-020D00B2F17E", versionEndExcluding: "0.19.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"parse_rollei()\" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infinite loop.", }, { lang: "es", value: "Un error en la función \"parse_rollei()\" (internal/dcraw_common.cpp), en las versiones de LibRaw anteriores a la 0.19.1, podría explotarse para desencadenar un bucle infinito.", }, ], id: "CVE-2018-5818", lastModified: "2024-11-21T04:09:28.340", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-20T18:29:00.710", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { source: "PSIRT-CNA@flexerasoftware.com", url: "https://usn.ubuntu.com/3989-1/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.libraw.org/news/libraw-0-19-2-release", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-835", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "95F3B87A-8038-491D-A05F-1ED7ECBAF479", versionEndExcluding: "0.18.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An integer overflow error within the \"parse_qt()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.", }, { lang: "es", value: "Un error de desbordamiento de enteros en la función \"parse_qt()\" (internal/dcraw_common.cpp) en LibRaw, en versiones anteriores a la 0.18.12, puede explotarse para provocar un bucle infinito mediante un archivo Apple QuickTime especialmente manipulado.", }, ], id: "CVE-2018-5815", lastModified: "2024-11-21T04:09:27.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.613", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8B6F1A-93CA-4AE5-8A1A-FBD6D4CFA400", versionEndExcluding: "0.18.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"samsung_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.", }, { lang: "es", value: "Un error en la función \"samsung_load_raw()\" (internal/dcraw_common.cpp) en LibRaw en versiones anteriores a la 0.18.9 se puede explotar para provocar un acceso de lectura a la memoria fuera de límites y un cierre inesperado.", }, ], id: "CVE-2018-5807", lastModified: "2024-11-21T04:09:26.920", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.957", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/81800/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-22 17:29
Modified
2024-11-21 04:01
Severity ?
Summary
LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106299 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/195 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106299 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/195 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "B036F248-BF46-4CB7-B574-B091ACBE5EAF", versionEndIncluding: "0.19.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow.", }, { lang: "es", value: "LibRaw::raw2image() en libraw_cxx.cpp tiene un desbordamiento de búfer basado en memoria dinámica (heap).", }, ], id: "CVE-2018-20365", lastModified: "2024-11-21T04:01:19.803", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-22T17:29:00.333", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106299", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/195", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106299", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/195", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-22 17:29
Modified
2024-11-21 04:01
Severity ?
Summary
LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106299 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/194 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3989-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106299 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/194 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3989-1/ |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "B036F248-BF46-4CB7-B574-B091ACBE5EAF", versionEndIncluding: "0.19.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference.", }, { lang: "es", value: "LibRaw::copy_bayer en libraw_cxx.cpp en LibRaw 0.19.1 tiene una desreferencia de puntero NULL.", }, ], id: "CVE-2018-20364", lastModified: "2024-11-21T04:01:19.660", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-22T17:29:00.287", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106299", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/194", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/3989-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106299", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/194", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/3989-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-01 18:15
Modified
2024-11-21 05:27
Severity ?
Summary
In LibRaw, there is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81 | Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/LibRaw/LibRaw/issues/283 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/283 | Exploit, Issue Tracking, Patch, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", matchCriteriaId: "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", matchCriteriaId: "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", matchCriteriaId: "8269B02E-558F-4AA5-9EEA-87226A3D1816", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", matchCriteriaId: "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", matchCriteriaId: "36C296E2-1899-457B-9EB2-916A33E383C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw, there is an out-of-bounds read vulnerability within the \"LibRaw::parseSonySRF()\" function (libraw\\src\\metadata\\sony.cpp) when processing srf files.", }, { lang: "es", value: "En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función \"LibRaw::parseSonySRF()\" (libraw\\src\\metadata\\sony.cpp) cuando son procesados archivos srf", }, ], id: "CVE-2020-35535", lastModified: "2024-11-21T05:27:31.240", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-01T18:15:09.027", references: [ { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/283", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/283", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-20 17:29
Modified
2024-11-21 03:13
Severity ?
Summary
In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/101 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/101 | Issue Tracking, Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "DA58125A-903F-4BC1-8B3D-2ECD63761144", versionEndIncluding: "0.18.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.", }, { lang: "es", value: "En LibRaw hasta la versión 0.18.4, un error de lectura fuera de límites relacionado con kodak_65000_load_raw se ha detectado en dcraw/dcraw.c e internal/dcraw_common.cpp. Un atacante podría explotar esta vulnerabilidad para divulgar memoria potencialmente sensible o provocar el cierre inesperado de la aplicación.", }, ], id: "CVE-2017-14608", lastModified: "2024-11-21T03:13:11.627", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-20T17:29:00.510", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/101", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/101", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-16 15:15
Modified
2024-11-21 05:16
Severity ?
Summary
A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/334 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/202010-05 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/334 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202010-05 | Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "290732D9-D09E-4149-AD2C-DCF404A1B24B", versionEndExcluding: "0.20.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.", }, { lang: "es", value: "Una vulnerabilidad de desbordamiento de búfer en LibRaw versiones anteriores a 20.0, la función LibRaw::GetNormalizedModel en el archivo src/metadata/normalize_model.cpp puede conllevar a una ejecución de código arbitraria dependiendo del contexto", }, ], id: "CVE-2020-24889", lastModified: "2024-11-21T05:16:10.057", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-16T15:15:12.527", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/334", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202010-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/334", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202010-05", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-29 03:29
Modified
2024-11-21 03:41
Severity ?
Summary
An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/144 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3639-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/144 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3639-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
libraw | libraw | 0.18.9 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.18.9:*:*:*:*:*:*:*", matchCriteriaId: "7E0EC812-F04B-4671-B565-1B48A368C85F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp.", }, { lang: "es", value: "Se ha descubierto un problema en LibRaw 0.18.9. Hay una lectura fuera de límites que afecta a la implementación de la lista de tablas de propiedades X3F en libraw_x3f.cpp y libraw_cxx.cpp.", }, ], id: "CVE-2018-10529", lastModified: "2024-11-21T03:41:30.200", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-29T03:29:00.373", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3639-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/144", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3639-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An error within the "LibRaw::unpack()" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "64A19E0C-8BED-4BFA-9287-9EB1EB760BB3", versionEndExcluding: "0.18.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"LibRaw::unpack()\" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.", }, { lang: "es", value: "Un error en la función \"LibRaw::unpack()\" (src/libraw_cxx.cpp) en LibRaw, en versiones anteriores a la 0.18.7, puede explotarse para desencadenar una desreferencia de puntero NULL.", }, ], id: "CVE-2018-5801", lastModified: "2024-11-21T04:09:26.087", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.520", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/79000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-16 16:29
Modified
2024-11-21 03:30
Severity ?
Summary
A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "54CB3A8F-1F07-49F4-AC34-9199D0EA24AF", versionEndIncluding: "0.18.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A boundary error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to \"DSLR-A100\" and containing multiple sequences of 0x100 and 0x14A TAGs.", }, { lang: "es", value: "Un error de límites dentro de la función \"parse_tiff_ifd()\" (en el archivo internal/dcraw_common.cpp) en LibRaw versiones anteriores a 0.18.2, puede ser explotado para causar un corrupción de memoria por medio de, por ejemplo, un archivo KDC especialmente diseñado con el modelo establecido en \"DSLR-A100\" y que contenga múltiples secuencias de TAGs 0x100 y 0x14A.", }, ], id: "CVE-2017-6887", lastModified: "2024-11-21T03:30:43.763", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-16T16:29:00.253", references: [ { source: "PSIRT-CNA@flexerasoftware.com", url: "http://www.debian.org/security/2017/dsa-3950", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/98592", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2017/dsa-3950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/98592", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/75737/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-11 09:29
Modified
2024-11-21 03:12
Severity ?
Summary
A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/99 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/99 | Patch, Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "CD1DD3D2-FD82-4212-B4CC-B44AF66EEC00", versionEndIncluding: "0.18.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.", }, { lang: "es", value: "Se descubrió una vulnerabilidad de desbordamiento de búfer basado en pila en xtrans_interpolate en internal/dcraw_common.cpp de LibRaw en versiones anteriores a la 0.18.3. Podría permitir un ataque remoto de denegación de servicio o de ejecución de código.", }, ], id: "CVE-2017-14265", lastModified: "2024-11-21T03:12:25.753", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-11T09:29:00.747", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/99", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/99", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-01 18:15
Modified
2024-11-21 05:27
Severity ?
Summary
In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading data from the image file.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb | Patch, Third Party Advisory | |
secalert@redhat.com | https://github.com/LibRaw/LibRaw/issues/273 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/273 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", matchCriteriaId: "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", matchCriteriaId: "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", matchCriteriaId: "8269B02E-558F-4AA5-9EEA-87226A3D1816", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", matchCriteriaId: "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", vulnerable: true, }, { criteria: "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", matchCriteriaId: "36C296E2-1899-457B-9EB2-916A33E383C2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In LibRaw, an out-of-bounds read vulnerability exists within the \"LibRaw::adobe_copy_pixel()\" function (libraw\\src\\decoders\\dng.cpp) when reading data from the image file.", }, { lang: "es", value: "En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función \"LibRaw::adobe_copy_pixel()\" (libraw\\src\\decoders\\dng.cpp) cuando son leídos datos del archivo de imagen", }, ], id: "CVE-2020-35533", lastModified: "2024-11-21T05:27:30.933", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-01T18:15:08.920", references: [ { source: "secalert@redhat.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/273", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/273", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-28 13:15
Modified
2024-11-21 05:05
Severity ?
Summary
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3 | Third Party Advisory | |
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/301 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/301 | Exploit, Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:0.20:beta3:*:*:*:*:*:*", matchCriteriaId: "91AB2B37-1EF7-4A77-86B8-122D7719D234", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.", }, { lang: "es", value: "LibRaw versiones anteriores a 0.20-Beta3, presenta una escritura fuera de límites en la función parse_exif() en el archivo metadata\\exif_gps.cpp por medio de un AtomName no reconocido y un valor cero de tiff_nifds", }, ], id: "CVE-2020-15365", lastModified: "2024-11-21T05:05:25.183", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-28T13:15:10.157", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/301", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/301", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-08-22 19:16
Modified
2024-11-21 05:13
Severity ?
Summary
Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/LibRaw/LibRaw/issues/269 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LibRaw/LibRaw/issues/269 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html | Mailing List, Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "27DFF8C5-9D6E-46BE-AC83-B1CFA0EC18E9", versionEndIncluding: "0.19.5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\\src\\postprocessing\\aspect_ratio.cpp.", }, { lang: "es", value: "Vulnerabilidad de desbordamiento de búfer en la función LibRaw::stretch() en libraw\\src\\postprocessing\\aspect_ratio.cpp.\n", }, ], id: "CVE-2020-22628", lastModified: "2024-11-21T05:13:19.760", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-08-22T19:16:19.353", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/269", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/issues/269", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 03:17
Severity ?
Summary
An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "036305D4-5201-467D-8C37-BB46FE267729", versionEndExcluding: "0.18.6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An error within the \"LibRaw::xtrans_interpolate()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.", }, { lang: "es", value: "Un error en la función \"LibRaw::xtrans_interpolate()\" (internal/dcraw_common.cpp) en LibRaw en versiones anteriores a la 0.18.6 se puede explotar para provocar un acceso de lectura a la memoria inválido y una condición de denegación de servicio (DoS).", }, ], id: "CVE-2017-16910", lastModified: "2024-11-21T03:17:13.727", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:00.350", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/76000/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3615-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-12-07 22:29
Modified
2024-11-21 04:09
Severity ?
Summary
An integer overflow error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libraw | libraw | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", matchCriteriaId: "95F3B87A-8038-491D-A05F-1ED7ECBAF479", versionEndExcluding: "0.18.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An integer overflow error within the \"identify()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804).", }, { lang: "es", value: "Un error de desbordamiento de enteros en la función \"identify()\" (internal/dcraw_common.cpp) en LibRaw, en versiones anteriores a la 0.18.12, puede explotarse para provocar una división entre cero mediante un archivo NOKIARAW especialmente manipulado (Nota: esta vulnerabilidad existe debido a una solución incompleta para CVE-2018-5804).", }, ], id: "CVE-2018-5816", lastModified: "2024-11-21T04:09:28.087", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-07T22:29:01.723", references: [ { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { source: "PSIRT-CNA@flexerasoftware.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/advisories/83507/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3838-1/", }, ], sourceIdentifier: "PSIRT-CNA@flexerasoftware.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }