CVE-2017-1000450

In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:04

Type Values Removed Values Added
References () https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor - Exploit, Third Party Advisory () https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor - Exploit, Third Party Advisory
References () https://github.com/opencv/opencv/issues/9723 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/opencv/opencv/issues/9723 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html - Mailing List, Third Party Advisory

Information

Published : 2018-01-02 17:29

Updated : 2024-11-21 03:04


NVD link : CVE-2017-1000450

Mitre link : CVE-2017-1000450

CVE.ORG link : CVE-2017-1000450


JSON object : View

Products Affected

debian

  • debian_linux

opencv

  • opencv
CWE
CWE-190

Integer Overflow or Wraparound