{"api_version":"1","generated_at":"2026-04-22T22:48:17+00:00","cve":"CVE-2017-1000450","urls":{"html":"https://cve.report/CVE-2017-1000450","api":"https://cve.report/api/cve/CVE-2017-1000450.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-1000450","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000450"},"summary":{"title":"CVE-2017-1000450","description":"In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-01-02 17:29:00","updated_at":"2021-11-30 22:05:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html","name":"[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update","refsource":"MLIST","tags":["Third Party Advisory"],"title":"[SECURITY] [DLA 1438-1] opencv security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/opencv/opencv/issues/9723","name":"https://github.com/opencv/opencv/issues/9723","refsource":"MISC","tags":["Exploit","Issue Tracking","Third Party Advisory"],"title":"Out of bounds write causes Segmentation Fault · Issue #9723 · opencv/opencv · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html","name":"[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2799-1] opencv security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor","name":"https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"pocs/0.OOB_Write_FillUniColor at master · blendin/pocs · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html","name":"[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update","refsource":"MLIST","tags":["Third Party Advisory"],"title":"[SECURITY] [DLA 1235-1] opencv security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-1000450","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000450","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"1000450","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"1000450","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"1000450","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"1000450","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"1000450","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"1000450","vulnerable":"1","versionEndIncluding":"3.3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opencv","cpe5":"opencv","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-1000450","qid":"178871","title":"Debian Security Update for opencv (DLA 2799-1)"},{"cve":"CVE-2017-1000450","qid":"980079","title":"Python (pip) Security Update for opencv-contrib-python (GHSA-m43c-649m-pm48)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2017-12-29","ID":"CVE-2017-1000450","REQUESTER":"btiszka@gmail.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html"},{"name":"https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor","refsource":"MISC","url":"https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor"},{"name":"[debian-lts-announce] 20180108 [SECURITY] [DLA 1235-1] opencv security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html"},{"name":"https://github.com/opencv/opencv/issues/9723","refsource":"MISC","url":"https://github.com/opencv/opencv/issues/9723"},{"refsource":"MLIST","name":"[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"}]}},"nvd":{"publishedDate":"2018-01-02 17:29:00","lastModifiedDate":"2021-11-30 22:05:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*","versionEndIncluding":"3.3.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"1000450","Ordinal":"119703","Title":"CVE-2017-1000450","CVE":"CVE-2017-1000450","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"1000450","Ordinal":"1","NoteData":"In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"1000450","Ordinal":"2","NoteData":"2018-01-02","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"1000450","Ordinal":"3","NoteData":"2021-10-30","Type":"Other","Title":"Modified"}]}}}