7.3 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.048 Low
EPSS
Percentile
92.5%
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
www.ocert.org/advisories/ocert-2015-006.html
www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
www.securityfocus.com/archive/1/535513/100/0/threaded
www.securityfocus.com/bid/74590
github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5
github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e
lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html
lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html
lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html
security.gentoo.org/glsa/201701-54
security.gentoo.org/glsa/201706-17