Vulnerability Name:

CVE-2020-35531 (CCN-235159)

Assigned:2020-04-02
Published:2020-04-02
Updated:2022-09-29
Summary:In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
3.3 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
3.0 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:1.7 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-125
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-35531

Source: XF
Type: UNKNOWN
libraw-cve202035531-dos(235159)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68

Source: CCN
Type: Libraw GIT Repository
LibRaw get_huffman_diff() Out-of-bounds read vulnerability #270

Source: MISC
Type: Issue Tracking, Patch, Third Party Advisory
https://github.com/LibRaw/LibRaw/issues/270

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20220916 [SECURITY] [DLA 3113-1] libraw security update

Source: CCN
Type: Mend Vulnerability Database
CVE-2020-35531

Vulnerable Configuration:Configuration 1:
  • cpe:/a:libraw:libraw:0.20.1:*:*:*:*:*:*:*
  • OR cpe:/a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:libraw:libraw:0.20.2:*:*:*:*:*:*:*
  • OR cpe:/a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:libraw:libraw:0.20.0:-:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:libraw:libraw:0.20.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    libraw libraw 0.20.1
    libraw libraw 0.21.0 beta1
    libraw libraw 0.20.2
    libraw libraw 0.20.0 rc2
    libraw libraw 0.20.0 -
    debian debian linux 10.0
    libraw libraw 0.20.0