CVE-2013-2126
Advisory lineage Upstream: 0 Downstream: 3
Deferred
Published: 14 Aug 2013, 15:00
Last modified:17 Sept 2024, 02:01
Vulnerability Summary
Overall Risk (default)
medium
41/100 CVSS Score
7.5 HIGH
v2.0 (nvd)
EPSS Score
3.23% LOW
3% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected
Timeline
14 Aug 2013, 15:00
Published
Vulnerability first disclosed
17 Sept 2024, 02:01
Last Modified
Vulnerability information updated
Description
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
CVSS Metrics
- v2.0•HIGH•Score: 7.5AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 3.23%• Percentile: 87%
Techniques & Countermeasures
- CWE-399•Resource Management Errors
Weaknesses in this category are related to improper management of system resources.
Affected Systems
- canonical•ubuntu_linux
12.04 | 12.10 | 13.04
- libraw•libraw
≤ 0.15.1 | 0.15.0
- opensuse•opensuse
12.2 | 12.3
References (12)
- http://secunia.com/advisories/53883
- http://secunia.com/advisories/53547
- http://www.ubuntu.com/usn/USN-1884-1
- http://www.ubuntu.com/usn/USN-1885-1
- http://www.libraw.org/news/libraw-0-15-2
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html
- https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html
- http://secunia.com/advisories/53938
- http://www.openwall.com/lists/oss-security/2013/06/10/1
- http://secunia.com/advisories/53888