Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p7r5-qh99-qchm

Опубликовано: 06 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9

Описание

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data.

We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size.

We recommend upgrading to version 8.0 or beyond.

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data.

We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size.

We recommend upgrading to version 8.0 or beyond.

EPSS

Процентиль: 8%
0.0003
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-787

Связанные уязвимости

ubuntu
около 2 месяцев назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.

nvd
около 2 месяцев назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.

debian
около 2 месяцев назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, the ...

CVSS3: 6.1
fstec
4 месяца назад

Уязвимость функции rle_raw_size мультимедийной библиотеки FFmpeg, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
redos
21 день назад

Множественные уязвимости ffmpeg

EPSS

Процентиль: 8%
0.0003
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-787