Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-42716

Опубликовано: 21 окт. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstbfixed0.0~git20230129.5736b15+ds-1package
libstbno-dsabookwormpackage
libstbnot-affectedbullseyepackage
libstbnot-affectedbusterpackage

Примечания

  • https://github.com/nothings/stb/issues/1166

  • https://github.com/nothings/stb/issues/1225

  • https://github.com/nothings/stb/pull/1223

  • 16-bin PNM support was added in

  • https://github.com/nothings/stb/commit/8befa752b005da174b2429c1ffaafffe452b2997

EPSS

Процентиль: 48%
0.00251
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 4 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

CVSS3: 8
redhat
больше 4 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

CVSS3: 7.1
nvd
больше 4 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

suse-cvrf
около 4 лет назад

Security update for stb

CVSS3: 9.1
github
больше 3 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

EPSS

Процентиль: 48%
0.00251
Низкий