Vulnerability CVE-2015-3885


Published: 2015-05-19

Description:
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.

Type:

CWE-189

(Numeric Errors)

Vendor: Dcraw project
Product: Dcraw 
Version: 7.00;
Vendor: Fedoraproject
Product: Fedora 
Version: 21;

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html
http://www.ocert.org/advisories/ocert-2015-006.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/archive/1/535513/100/0/threaded
http://www.securityfocus.com/bid/74590
https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5
https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e
https://security.gentoo.org/glsa/201701-54
https://security.gentoo.org/glsa/201706-17

Related CVE
CVE-2019-16239
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
CVE-2019-15718
In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus messages. An unprivile...
CVE-2019-11500
In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
CVE-2019-9852
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Script...
CVE-2019-9851
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calli...
CVE-2019-9850
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify tha...
CVE-2019-13377
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able...
CVE-2019-12854
Due to incorrect string termination, Squid cachemgr.cgi 4.0 through 4.7 may access unallocated memory. On systems with memory access protections, this can cause the CGI process to terminate unexpectedly, resulting in a denial of service for all clien...

Copyright 2019, cxsecurity.com

 

Back to Top