Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-1325

Опубликовано: 31 авг. 2022
Источник: debian

Описание

A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cimgfixed3.1.6+dfsg-1package
cimgno-dsabullseyepackage
cimgno-dsabusterpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2074549

  • https://github.com/GreycLab/CImg/commit/619cb58dd90b4e03ac68286c70ed98acbefd1c90 (v3.1.0)

  • https://github.com/GreycLab/CImg/issues/343

  • https://github.com/GreycLab/CImg/pull/348

  • https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 3 лет назад

A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.

CVSS3: 5.5
nvd
больше 3 лет назад

A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.

CVSS3: 5.5
github
больше 3 лет назад

A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.