5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
23.8%
stb_image is a single file MIT licensed library for processing images. The
stbi__getn function reads a specified number of bytes from context
(typically a file) into the specified buffer. In case the file stream
points to the end, it returns zero. There are two places where its return
value is not checked: In the stbi__hdr_load
function and in the
stbi__tga_load
function. The latter of the two is likely more exploitable
as an attacker may also control the size of an uninitialized buffer.
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1664
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L5936C10-L5936C20
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L7221
launchpad.net/bugs/cve/CVE-2023-45663
nvd.nist.gov/vuln/detail/CVE-2023-45663
security-tracker.debian.org/tracker/CVE-2023-45663
securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
www.cve.org/CVERecord?id=CVE-2023-45663