CVE-2016-1516
Published: 10 April 2017
OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code.
From the Ubuntu Security Team
It was discovered that OpenCV incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or other unspecified impact.
Priority
Status
Package | Release | Status |
---|---|---|
opencv Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Released
(3.2.0+dfsg-4ubuntu0.1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(2.4.8+dfsg1-2ubuntu1.1)
|
|
upstream |
Released
(2.4.9.1+dfsg-1+deb8u2, 2.3.1-11+deb7u2)
|
|
xenial |
Released
(2.4.9.1+dfsg-1.5ubuntu1.1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |