Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-25693

Опубликовано: 03 дек. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cimgfixed2.9.4+dfsg-2package
cimgfixed2.4.5+dfsg-1+deb10u1busterpackage

Примечания

  • https://github.com/dtschump/CImg/pull/295

  • https://bugs.launchpad.net/ubuntu/+source/cimg/+bug/1900983

  • Fixed by: https://github.com/dtschump/CImg/commit/4f184f89f9ab6785a6c90fd238dbaa6d901d3505

EPSS

Процентиль: 68%
0.00558
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 5 лет назад

A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.

CVSS3: 8.1
nvd
около 5 лет назад

A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.

github
больше 3 лет назад

A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.

CVSS3: 8.1
fstec
больше 5 лет назад

Уязвимость функции load_pnm() библиотеки CImg, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 68%
0.00558
Низкий