Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the Imf_2_2::CharPtrIO::readChars() function when reading images in EXR format.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/04/11/10 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/3 | Mailing List Third Party Advisory |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
| http://www.openwall.com/lists/oss-security/2024/04/11/10 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/3 | Mailing List Third Party Advisory |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
Configurations
History
28 Mar 2025, 14:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2024/04/11/10 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/04/11/2 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/04/11/3 - Mailing List, Third Party Advisory | |
| References | () https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 - Third Party Advisory, Exploit | |
| First Time |
Freeimage Project
Freeimage Project freeimage |
|
| CPE | cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:* |
Information
Published : 2024-03-20 06:15
Updated : 2025-03-28 14:51
NVD link : CVE-2024-28564
Mitre link : CVE-2024-28564
CVE.ORG link : CVE-2024-28564
JSON object : View
Products Affected
freeimage_project
- freeimage
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
