Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-42716

Опубликовано: 21 окт. 2021
Источник: nvd
CVSS3: 7.1
CVSS2: 5.8
EPSS Низкий

Описание

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

EPSS

Процентиль: 48%
0.00251
Низкий

7.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 4 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

CVSS3: 8
redhat
больше 4 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

CVSS3: 7.1
debian
больше 4 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorr ...

suse-cvrf
около 4 лет назад

Security update for stb

CVSS3: 9.1
github
больше 3 лет назад

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

EPSS

Процентиль: 48%
0.00251
Низкий

7.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-120