Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the readLine() function when reading images in XPM format.
References
| Link | Resource |
|---|---|
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
Configurations
History
28 Mar 2025, 14:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 - Third Party Advisory, Exploit | |
| CPE | cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:* | |
| First Time |
Freeimage Project freeimage
Freeimage Project |
21 Nov 2024, 09:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 - | |
| Summary |
|
05 Aug 2024, 18:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-120 |
20 Mar 2024, 13:00
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-20 06:15
Updated : 2025-03-28 14:48
NVD link : CVE-2024-28583
Mitre link : CVE-2024-28583
CVE.ORG link : CVE-2024-28583
JSON object : View
Products Affected
freeimage_project
- freeimage
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
