Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the psdParser::ReadImageData() function when reading images in PSD format.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/04/11/10 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/3 | Mailing List Third Party Advisory |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
| http://www.openwall.com/lists/oss-security/2024/04/11/10 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/04/11/3 | Mailing List Third Party Advisory |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2024-03-20 06:15
Updated : 2025-03-28 14:51
NVD link : CVE-2024-28565
Mitre link : CVE-2024-28565
CVE.ORG link : CVE-2024-28565
JSON object : View
Products Affected
freeimage_project
- freeimage
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
