Описание
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-12211
- https://lists.debian.org/debian-lts-announce/2019/12/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUWVVP67FYM4GMWD7TPQ7C7JPPRUZHYE
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZ7KBYPPNRMX7RRWVJSX4T63E3TFB6TG
- https://seclists.org/bugtraq/2019/Dec/45
- https://security.gentoo.org/glsa/202107-02
- https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5
- https://usn.ubuntu.com/4529-1
- https://www.debian.org/security/2019/dsa-4593
Связанные уязвимости
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load ...
Уязвимость компонента PluginTIFF.cpp библиотеки для работы с графическими форматами FreeImages, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании