In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.
References
Link | Resource |
---|---|
https://github.com/opencv/opencv/issues/9372 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201712-02 | Third Party Advisory |
https://github.com/opencv/opencv/issues/9372 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201712-02 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/opencv/opencv/issues/9372 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201712-02 - Third Party Advisory |
Information
Published : 2017-08-15 16:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12864
Mitre link : CVE-2017-12864
CVE.ORG link : CVE-2017-12864
JSON object : View
Products Affected
debian
- debian_linux
opencv
- opencv
CWE
CWE-190
Integer Overflow or Wraparound