CVE-2020-24870
Published on: 06/02/2021 12:00:00 AM UTC
Last Modified on: 12/09/2022 06:25:00 PM UTC
Certain versions of Libraw from Libraw contain the following vulnerability:
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.
- CVE-2020-24870 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 8.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
LibRaw: Stack buffer overread (GLSA 202208-07) — Gentoo security | security.gentoo.org text/html |
![]() |
stack buffer overflow in LibRaw::identify_process_dng_fields in identify.cpp · Issue #330 · LibRaw/LibRaw · GitHub | github.com text/html |
![]() |
limit loops to MIN(colors,4) in dng fields parser · LibRaw/[email protected]4feaed4 · GitHub | github.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Libraw | Libraw | All | All | All | All |
- cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2020-24870 : Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identi… twitter.com/i/web/status/1… | 2021-06-02 16:03:12 |
![]() |
CVE-2020-24870 | 2021-06-02 16:41:31 |