CImg The CImg Library v.2.3.3 and earlier is affected by: command injection. The impact is: RCE. The component is: load_network() function. The attack vector is: Loading an image from a user-controllable url can lead to command injection, because no string sanitization is done on the url. The fixed version is: v.2.3.4.
References
Link | Resource |
---|---|
https://framagit.org/dtschump/CImg/commit/5ce7a426b77f814973e56182a0e76a2b04904146 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00030.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/10/msg00033.html | Mailing List Third Party Advisory |
Information
Published : 2019-07-25 07:15
Updated : 2023-03-01 10:00
NVD link : CVE-2019-1010174
Mitre link : CVE-2019-1010174
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
debian
- debian_linux
cimg
- cimg_library