Libraw

Libraw

55 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 01.09.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:27:30

In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.

  • EPSS 0.02%
  • Veröffentlicht 01.09.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:27:30

In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 01.09.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:27:30

In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.

  • EPSS 0.18%
  • Veröffentlicht 02.06.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:16:09

Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 16.09.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:16:10

libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way

Exploit
  • EPSS 0.93%
  • Veröffentlicht 16.09.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:16:10

A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.

  • EPSS 1%
  • Veröffentlicht 02.07.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:05:39

LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tl...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 28.06.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:25

LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.

  • EPSS 1.73%
  • Veröffentlicht 14.01.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 02:38:22

The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization.

  • EPSS 1.28%
  • Veröffentlicht 14.01.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 02:38:22

Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.