CVE-2020-35532
- EPSS 0.02%
- Veröffentlicht 01.09.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:27:30
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
CVE-2020-35531
- EPSS 0.02%
- Veröffentlicht 01.09.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:27:30
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
CVE-2020-35530
- EPSS 0.02%
- Veröffentlicht 01.09.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:27:30
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.
CVE-2020-24870
- EPSS 0.18%
- Veröffentlicht 02.06.2021 16:15:08
- Zuletzt bearbeitet 21.11.2024 05:16:09
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.
CVE-2020-24890
- EPSS 0.45%
- Veröffentlicht 16.09.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:16:10
libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way
CVE-2020-24889
- EPSS 0.93%
- Veröffentlicht 16.09.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:16:10
A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.
CVE-2020-15503
- EPSS 1%
- Veröffentlicht 02.07.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:39
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tl...
CVE-2020-15365
- EPSS 0.28%
- Veröffentlicht 28.06.2020 13:15:10
- Zuletzt bearbeitet 21.11.2024 05:05:25
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
CVE-2015-8367
- EPSS 1.73%
- Veröffentlicht 14.01.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 02:38:22
The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.
CVE-2015-8366
- EPSS 1.28%
- Veröffentlicht 14.01.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 02:38:22
Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.