Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-12214

Опубликовано: 20 мая 2019
Источник: debian
EPSS Низкий

Описание

In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freeimageunfixedpackage
freeimagepostponedtrixiepackage
freeimagepostponedbookwormpackage
freeimagepostponedbullseyepackage
freeimagepostponedbusterpackage
freeimagepostponedstretchpackage
freeimagepostponedjessiepackage

Примечания

  • https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/

  • very few information regarding this vulnerability, which is seemingly located

  • in libopenjpeg, not freeimage. Without reproducer or stacktrace, this is

  • nearly unfixable.

EPSS

Процентиль: 56%
0.00334
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.

CVSS3: 7.5
nvd
больше 6 лет назад

In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.

CVSS3: 7.5
github
больше 3 лет назад

In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.

EPSS

Процентиль: 56%
0.00334
Низкий