Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-24889

Опубликовано: 16 сент. 2020
Источник: debian
EPSS Низкий

Описание

A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
librawfixed0.20.2-1package
librawnot-affectedbusterpackage
librawnot-affectedstretchpackage

Примечания

  • https://github.com/LibRaw/LibRaw/issues/334

  • https://github.com/LibRaw/LibRaw/commit/78d323ecbe6a9752aee6e97118a76d40704d73ee

EPSS

Процентиль: 76%
0.00931
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.

CVSS3: 5.3
redhat
больше 5 лет назад

A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.

CVSS3: 7.8
nvd
больше 5 лет назад

A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.

CVSS3: 7.8
github
больше 3 лет назад

A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.

EPSS

Процентиль: 76%
0.00931
Низкий