CVE-2017-6889
Advisory lineage Upstream: 0 Downstream: 1
Downstream
Deferred
Published: 15 May 2017, 18:00
Last modified:05 Aug 2024, 15:41
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.8 CRITICAL
v3.0 (nvd)
EPSS Score
0.44% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
15 May 2017, 18:00
Published
Vulnerability first disclosed
05 Aug 2024, 15:41
Last Modified
Vulnerability information updated
Description
An integer overflow error within the "foveon_load_camf()" function (dcraw_foveon.c) in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a heap-based buffer overflow.
CVSS Metrics
- v3.0•CRITICAL•Score: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- v2.0•HIGH•Score: 7.5AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 0.44%• Percentile: 63%
Techniques & Countermeasures
- CWE-190•Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Affected Systems
- libraw•libraw-demosaic-pack-gpl2
≤ 0.18.1 | 0.x prior to 0.18.2