CVE-2019-12211
Published: 20 May 2019
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
From the Ubuntu security team
It was discovered that FreeImage incorrectly handled certain memory operations. If a user were tricked into opening a crafted TIFF file, a remote attacker could use this issue to cause a heap buffer overflow, resulting in a denial of service attack.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
freeimage Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(3.18.0+ds2-6ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needed
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(3.17.0+ds1-5+deb9u1build0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needs triage
|