CVE-2020-21427
Advisory lineage Upstream: 0 Downstream: 5
Modified
Published: 22 Aug 2023, 00:00
Last modified:05 May 2025, 12:50
Vulnerability Summary
Overall Risk (default)
medium
31/100 CVSS Score
7.8 HIGH
v3.1 (cve.org)
EPSS Score
0.85% LOW
1% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
22 Aug 2023, 00:00
Published
Vulnerability first disclosed
05 May 2025, 12:50
Last Modified
Vulnerability information updated
Description
Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.
CVSS Metrics
- v3.1•HIGH•Score: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Trends
Current EPSS score: 0.85%• Percentile: 75%
Techniques & Countermeasures
- CWE-120•Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Affected Systems
- freeimage_project•freeimage
3.18.0
References (5)
- https://sourceforge.net/p/freeimage/bugs/298/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RUEK2JOVJBQZVNQIIZZO3JFMTVB4R5KS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGOMCRAANNCQYJYPPMGRQWKRZGIP6NME/
- https://lists.debian.org/debian-lts-announce/2023/11/msg00020.html
- https://www.debian.org/security/2023/dsa-5579