2023-10-29 09:06:41 +00:00
{
"id" : "CVE-2023-45661" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-10-21T00:15:08.783" ,
2023-11-04 07:00:24 +00:00
"lastModified" : "2023-11-04T06:15:52.677" ,
2023-11-04 00:55:22 +00:00
"vulnStatus" : "Modified" ,
2023-10-29 09:06:41 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "stb_image is a single file MIT licensed library for processing images. A crafted image file may trigger out of bounds memcpy read in `stbi__gif_load_next`. This happens because two_back points to a memory address lower than the start of the buffer out. This issue may be used to leak internal memory allocation information."
} ,
{
"lang" : "es" ,
"value" : "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. Un archivo de imagen manipulado puede provocar una lectura de memcpy fuera de l\u00edmites en `stbi__gif_load_next`. Esto sucede porque two_back apunta a una direcci\u00f3n de memoria inferior al inicio del b\u00fafer de salida. Este problema puede utilizarse para filtrar informaci\u00f3n de asignaci\u00f3n de memoria interna."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.2
} ,
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.5
}
]
} ,
"weaknesses" : [
{
2023-11-04 00:55:22 +00:00
"source" : "security-advisories@github.com" ,
2023-10-29 09:06:41 +00:00
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
}
]
} ,
{
2023-11-04 00:55:22 +00:00
"source" : "nvd@nist.gov" ,
2023-10-29 09:06:41 +00:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6817" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L7021-L7022" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
2023-11-04 07:00:24 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMXKOKPP4BKTNUTF5KSRDQAWOUILQZNO/" ,
"source" : "security-advisories@github.com"
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVABVF4GEM6BYD5L4L64RCRSXUHY6LGN/" ,
"source" : "security-advisories@github.com"
} ,
2023-11-04 00:55:22 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVQ7ONFH5GWLMXYEAJG32A3EUKUCEVCR/" ,
"source" : "security-advisories@github.com"
} ,
2023-10-29 09:06:41 +00:00
{
"url" : "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
}
]
}