{"api_version":"1","generated_at":"2026-04-22T22:47:35+00:00","cve":"CVE-2017-12864","urls":{"html":"https://cve.report/CVE-2017-12864","api":"https://cve.report/api/cve/CVE-2017-12864.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-12864","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-12864"},"summary":{"title":"CVE-2017-12864","description":"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-08-15 16:29:00","updated_at":"2021-11-30 22:05:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://github.com/opencv/opencv/issues/9372","name":"https://github.com/opencv/opencv/issues/9372","refsource":"MISC","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"Integer overflow in ReadNumber · Issue #9372 · opencv/opencv · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201712-02","name":"GLSA-201712-02","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"OpenCV: Multiple vulnerabilities (GLSA 201712-02) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html","name":"[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] [DLA 1438-1] opencv security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html","name":"[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2799-1] opencv security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-12864","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12864","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"12864","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"12864","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"12864","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"12864","vulnerable":"1","versionEndIncluding":"3.3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opencv","cpe5":"opencv","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-12864","qid":"178871","title":"Debian Security Update for opencv (DLA 2799-1)"},{"cve":"CVE-2017-12864","qid":"710324","title":"Gentoo Linux OpenCV Multiple Vulnerabilities (GLSA 201712-02)"},{"cve":"CVE-2017-12864","qid":"980081","title":"Python (pip) Security Update for opencv-contrib-python (GHSA-267x-w5hx-8hjr)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-12864","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html"},{"name":"GLSA-201712-02","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201712-02"},{"name":"https://github.com/opencv/opencv/issues/9372","refsource":"MISC","url":"https://github.com/opencv/opencv/issues/9372"},{"refsource":"MLIST","name":"[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"}]}},"nvd":{"publishedDate":"2017-08-15 16:29:00","lastModifiedDate":"2021-11-30 22:05:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*","versionEndIncluding":"3.3.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"12864","Ordinal":"110015","Title":"CVE-2017-12864","CVE":"CVE-2017-12864","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"12864","Ordinal":"1","NoteData":"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"12864","Ordinal":"2","NoteData":"2017-08-15","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"12864","Ordinal":"3","NoteData":"2021-10-30","Type":"Other","Title":"Modified"}]}}}