Total
50 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-2127 | 1 Libraw | 1 Libraw | 2024-11-21 | 7.5 HIGH | N/A |
Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. | |||||
CVE-2013-2126 | 3 Canonical, Libraw, Opensuse | 3 Ubuntu Linux, Libraw, Opensuse | 2024-11-21 | 7.5 HIGH | N/A |
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file. | |||||
CVE-2013-1439 | 1 Libraw | 1 Libraw | 2024-11-21 | 4.3 MEDIUM | N/A |
The "faster LJPEG decoder" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file. | |||||
CVE-2020-24890 | 1 Libraw | 1 Libraw | 2024-08-04 | 2.6 LOW | 5.5 MEDIUM |
** DISPUTED ** libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way. | |||||
CVE-2023-1729 | 3 Fedoraproject, Libraw, Redhat | 3 Fedora, Libraw, Enterprise Linux | 2024-07-10 | N/A | 6.5 MEDIUM |
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash. | |||||
CVE-2021-32142 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 7.8 HIGH |
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. | |||||
CVE-2020-35530 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 5.5 MEDIUM |
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file. | |||||
CVE-2020-35531 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 5.5 MEDIUM |
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. | |||||
CVE-2020-35535 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 5.5 MEDIUM |
In LibRaw, there is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files. | |||||
CVE-2020-35534 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 5.5 MEDIUM |
In LibRaw, there is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files. | |||||
CVE-2020-35533 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 5.5 MEDIUM |
In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading data from the image file. | |||||
CVE-2020-35532 | 1 Libraw | 1 Libraw | 2024-02-04 | N/A | 5.5 MEDIUM |
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field. | |||||
CVE-2020-24870 | 1 Libraw | 1 Libraw | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp. | |||||
CVE-2020-24889 | 1 Libraw | 1 Libraw | 2024-02-04 | 5.1 MEDIUM | 7.8 HIGH |
A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution. | |||||
CVE-2020-15503 | 2 Fedoraproject, Libraw | 2 Fedora, Libraw | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength. | |||||
CVE-2020-15365 | 1 Libraw | 1 Libraw | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds. | |||||
CVE-2015-8366 | 1 Libraw | 1 Libraw | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes. | |||||
CVE-2015-8367 | 1 Libraw | 1 Libraw | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The phase_one_correct function in Libraw before 0.17.1 allows attackers to cause memory errors and possibly execute arbitrary code, related to memory object initialization. | |||||
CVE-2018-5805 | 2 Libraw, Redhat | 4 Libraw, Enterprise Linux Desktop, Enterprise Linux Server and 1 more | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash. | |||||
CVE-2018-5800 | 4 Canonical, Debian, Libraw and 1 more | 6 Ubuntu Linux, Debian Linux, Libraw and 3 more | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash. |