CVE-2017-12601

OpenCV (Open Source Computer Vision Library) through 3.3 has a buffer overflow in the cv::BmpDecoder::readData function in modules/imgcodecs/src/grfmt_bmp.cpp when reading an image file by using cv::imread, as demonstrated by the 4-buf-overflow-readData-memcpy test case.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
References () https://github.com/opencv/opencv/issues/9309 - Issue Tracking, Patch, Third Party Advisory () https://github.com/opencv/opencv/issues/9309 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/xiaoqx/pocs/blob/master/opencv.md - Broken Link, Third Party Advisory () https://github.com/xiaoqx/pocs/blob/master/opencv.md - Broken Link, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201712-02 - Third Party Advisory () https://security.gentoo.org/glsa/201712-02 - Third Party Advisory

Information

Published : 2017-08-07 01:29

Updated : 2024-11-21 03:09


NVD link : CVE-2017-12601

Mitre link : CVE-2017-12601

CVE.ORG link : CVE-2017-12601


JSON object : View

Products Affected

debian

  • debian_linux

opencv

  • opencv
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')