Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the fill_input_buffer() function when reading images in JPEG format.
References
| Link | Resource |
|---|---|
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
Configurations
History
28 Mar 2025, 14:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 - Third Party Advisory, Exploit | |
| First Time |
Freeimage Project
Freeimage Project freeimage |
|
| CPE | cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:* |
Information
Published : 2024-03-20 06:15
Updated : 2025-03-28 14:48
NVD link : CVE-2024-28571
Mitre link : CVE-2024-28571
CVE.ORG link : CVE-2024-28571
JSON object : View
Products Affected
freeimage_project
- freeimage
CWE
CWE-125
Out-of-bounds Read
