Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5684

Опубликовано: 06 янв. 2017
Источник: debian
EPSS Низкий

Описание

An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freeimagefixed3.17.0+ds1-3package

Примечания

  • http://www.talosintelligence.com/reports/TALOS-2016-0189/

  • http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.17&r2=1.18

  • http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginXPM.cpp?r1=1.18&r2=1.19

EPSS

Процентиль: 65%
0.00496
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 9 лет назад

An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.

CVSS3: 7.8
nvd
около 9 лет назад

An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.

suse-cvrf
около 8 лет назад

Security update for freeimage

CVSS3: 7.8
github
больше 3 лет назад

An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.

EPSS

Процентиль: 65%
0.00496
Низкий