CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
17.1%
A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in image decoders. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw.
This flaw can be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on ImageSharp for image processing tasks. Users and administrators are advised to update to the latest version of ImageSharp that addresses this vulnerability to mitigate the risk of exploitation.
The problem has been patched. All users are advised to upgrade to v3.1.4 or v2.1.8.
Before calling Image.Decode(Async)
, use Image.Identify
to determine the image dimensions in order to enforce a limit.
docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands
docs.sixlabors.com/articles/imagesharp/security.html
github.com/SixLabors/ImageSharp
github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3
github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27
github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7
nvd.nist.gov/vuln/detail/CVE-2024-32035