Products
FreeImage
Source
patrick@puiterwijk.org
Tags
CVE-2024-9029 details
Published : Sept. 27, 2024, 7:15 a.m.
Last Modified : Sept. 27, 2024, 1:15 p.m.
Last Modified : Sept. 27, 2024, 1:15 p.m.
Description
A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.5 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-126 | Buffer Over-read | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
7.5
Exploitability Score
3.9
Impact Score
3.6
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
URL | Source |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2313704 | patrick@puiterwijk.org |
https://sourceforge.net/p/freeimage/bugs/351/ | patrick@puiterwijk.org |
This website uses the NVD API, but is not approved or certified by it.