osv-2021-1651
Vulnerability from osv_ossfuzz
Published
2021-12-06 00:00
Modified
2023-02-24 02:04
Summary
Heap-buffer-overflow in PCIDSK::CPCIDSKFile::ReadFromFile
Details
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993
Crash type: Heap-buffer-overflow WRITE {*}
Crash state:
PCIDSK::CPCIDSKFile::ReadFromFile
PCIDSK::CPCIDSKSegment::ReadFromFile
PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment
{
"affected": [
{
"database_specific": {
"fixed_range": "a6d42bd6adbdcec27a6a64c844598912d325de14:73f006c054b47b00acf42bc6bf96e348fd53ab4b",
"introduced_range": "53960d2a40b39b4482efc514f9ca289652447675:762a261f32617b506a9fc199040a5dbdc5214716"
},
"ecosystem_specific": {
"severity": "MEDIUM"
},
"package": {
"ecosystem": "OSS-Fuzz",
"name": "gdal"
},
"ranges": [
{
"events": [
{
"introduced": "3c7e9db1ab4d28306a8700e38d2f4c0e2fa46b82"
},
{
"fixed": "1ca6a3e5168c200763fa46d8aa7e698d0b757e7e"
},
{
"fixed": "73f006c054b47b00acf42bc6bf96e348fd53ab4b"
}
],
"repo": "https://github.com/OSGeo/gdal",
"type": "GIT"
}
],
"versions": [
"v3.3.0",
"v3.3.0RC1",
"v3.3.0beta1",
"v3.3.1",
"v3.3.1RC1",
"v3.3.2",
"v3.3.2RC1",
"v3.3.2RC2",
"v3.3.2RC3",
"v3.3.3",
"v3.3.3RC1",
"v3.4.0",
"v3.4.0RC1",
"v3.4.0RC2",
"v3.4.0RC3",
"v3.4.1",
"v3.4.1RC1",
"v3.4.2",
"v3.4.2RC1",
"v3.4.2RC2",
"v3.4.3",
"v3.4.3RC1",
"v3.4.3RC2"
]
}
],
"details": "OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993\n\n```\nCrash type: Heap-buffer-overflow WRITE {*}\nCrash state:\nPCIDSK::CPCIDSKFile::ReadFromFile\nPCIDSK::CPCIDSKSegment::ReadFromFile\nPCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment\n```\n",
"id": "OSV-2021-1651",
"modified": "2023-02-24T02:04:52.362539Z",
"published": "2021-12-06T00:00:07.396834Z",
"references": [
{
"type": "REPORT",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993"
}
],
"summary": "Heap-buffer-overflow in PCIDSK::CPCIDSKFile::ReadFromFile"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…