There is an integer overflow vulnerability in dcraw. When the victim runs dcraw with a maliciously crafted X3F input image, arbitrary code may be executed in the victim's system.
Max CVSS
9.3
EPSS Score
0.07%
Published
2022-04-18
Updated
2022-04-25
A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.
Max CVSS
8.8
EPSS Score
0.85%
Published
2018-11-29
Updated
2020-08-24
A floating point exception in kodak_radc_load_raw in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code.
Max CVSS
5.5
EPSS Score
0.06%
Published
2018-11-26
Updated
2018-12-19
A floating point exception in parse_tiff_ifd in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code.
Max CVSS
5.5
EPSS Score
0.06%
Published
2018-11-26
Updated
2018-12-19
A heap buffer over-read in parse_tiff_ifd in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information.
Max CVSS
7.1
EPSS Score
0.07%
Published
2018-11-26
Updated
2018-12-19
A buffer over-read in crop_masked_pixels in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information.
Max CVSS
7.1
EPSS Score
0.07%
Published
2018-11-26
Updated
2018-12-19
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
Max CVSS
4.3
EPSS Score
4.80%
Published
2015-05-19
Updated
2018-10-09
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!