Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the Imf_2_2::Xdr::read() function when reading images in EXR format.
References
| Link | Resource |
|---|---|
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
| https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2024-03-20 06:15
Updated : 2025-03-28 14:49
NVD link : CVE-2024-28569
Mitre link : CVE-2024-28569
CVE.ORG link : CVE-2024-28569
JSON object : View
Products Affected
freeimage_project
- freeimage
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
