mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
130 lines
5.2 KiB
JSON
130 lines
5.2 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-41132",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "ImageSharp is a 2D graphics API. A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in the Gif decoder. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw. All users are advised to upgrade to v3.1.5 or v2.1.9."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-789: Memory Allocation with Excessive Size Value",
|
|
"cweId": "CWE-789"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SixLabors",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "ImageSharp",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "< 2.1.9"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 3.0.0, < 3.1.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-qxrv-gp6x-rc23",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-qxrv-gp6x-rc23"
|
|
},
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/pull/2759",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/pull/2759"
|
|
},
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/pull/2764",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/pull/2764"
|
|
},
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/pull/2770",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/pull/2770"
|
|
},
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/commit/59de13c8cc47f2b402e2c43aa7024511d029d515",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/commit/59de13c8cc47f2b402e2c43aa7024511d029d515"
|
|
},
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/commit/9816ca45016c5d3859986f3c600e8934bc450a56",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/commit/9816ca45016c5d3859986f3c600e8934bc450a56"
|
|
},
|
|
{
|
|
"url": "https://github.com/SixLabors/ImageSharp/commit/b496109051cc39feee1f6cde48fca6481de17f9a",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/SixLabors/ImageSharp/commit/b496109051cc39feee1f6cde48fca6481de17f9a"
|
|
},
|
|
{
|
|
"url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands",
|
|
"refsource": "MISC",
|
|
"name": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands"
|
|
},
|
|
{
|
|
"url": "https://docs.sixlabors.com/articles/imagesharp/security.html",
|
|
"refsource": "MISC",
|
|
"name": "https://docs.sixlabors.com/articles/imagesharp/security.html"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-qxrv-gp6x-rc23",
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |