In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
Max CVSS
9.1
EPSS Score
0.22%
Published
2017-09-20
Updated
2017-09-27
A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.
Max CVSS
9.8
EPSS Score
1.51%
Published
2017-09-11
Updated
2017-09-18
A boundary error within the "foveon_load_camf()" function (dcraw_foveon.c) when initializing a huffman table in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a stack-based buffer overflow.
Max CVSS
9.8
EPSS Score
0.25%
Published
2017-05-15
Updated
2017-05-25
An integer overflow error within the "foveon_load_camf()" function (dcraw_foveon.c) in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a heap-based buffer overflow.
Max CVSS
9.8
EPSS Score
0.25%
Published
2017-05-15
Updated
2017-05-24
An error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory.
Max CVSS
9.8
EPSS Score
0.55%
Published
2017-05-16
Updated
2017-11-04
The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.
Max CVSS
9.8
EPSS Score
1.72%
Published
2020-01-14
Updated
2020-01-24
Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
Max CVSS
9.8
EPSS Score
0.95%
Published
2020-01-14
Updated
2020-01-21
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!