Vulnerability Name: | CVE-2017-1000450 (CCN-136982) | ||||||||||||||||||||||||||||||||
Assigned: | 2017-09-27 | ||||||||||||||||||||||||||||||||
Published: | 2017-09-27 | ||||||||||||||||||||||||||||||||
Updated: | 2021-11-30 | ||||||||||||||||||||||||||||||||
Summary: | In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-1000450 Source: XF Type: UNKNOWN opencv-cve20171000450-integer-overflow(136982) Source: MISC Type: Exploit, Third Party Advisory https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor Source: CCN Type: opencv GIT Repository Out of bounds write causes Segmentation Fault #9723 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/opencv/opencv/issues/9723 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |