When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
References
Link | Resource |
---|---|
https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/ | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUWVVP67FYM4GMWD7TPQ7C7JPPRUZHYE/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZ7KBYPPNRMX7RRWVJSX4T63E3TFB6TG/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00012.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2019/dsa-4593 | Third Party Advisory |
https://seclists.org/bugtraq/2019/Dec/45 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4529-1/ | Third Party Advisory |
https://security.gentoo.org/glsa/202107-02 | Third Party Advisory |
Information
Published : 2019-05-20 09:29
Updated : 2023-02-01 11:52
NVD link : CVE-2019-12211
Mitre link : CVE-2019-12211
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
freeimage_project
- freeimage
canonical
- ubuntu_linux