| Vulnerability Name: | CVE-2017-12862 (CCN-130526) | ||||||||||||||||||||||||||||||||
| Assigned: | 2017-08-15 | ||||||||||||||||||||||||||||||||
| Published: | 2017-08-15 | ||||||||||||||||||||||||||||||||
| Updated: | 2021-11-30 | ||||||||||||||||||||||||||||||||
| Summary: | In modules/imgcodecs/src/grfmt_pxm.cpp, the length of buffer AutoBuffer _src is small than expected, which will cause copy buffer overflow later. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-12862 Source: XF Type: UNKNOWN opencv-cve201712862-bo(130526) Source: CCN Type: opencv GIT Repository AutoBuffer_heap_overflow in grfmt_pxm.cpp #9370 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/opencv/opencv/issues/9370 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update Source: GENTOO Type: Third Party Advisory GLSA-201712-02 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||