CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
92.7%
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
Vendor | Product | Version | CPE |
---|---|---|---|
dcraw_project | dcraw | * | cpe:2.3:a:dcraw_project:dcraw:*:*:*:*:*:*:*:* |
fedoraproject | fedora | 21 | cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html
lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html
lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html
www.ocert.org/advisories/ocert-2015-006.html
www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
www.securityfocus.com/archive/1/535513/100/0/threaded
www.securityfocus.com/bid/74590
github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5
github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e
security.gentoo.org/glsa/201701-54
security.gentoo.org/glsa/201706-17