8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
40.4%
stb_image is a single file MIT licensed library for processing images. A
crafted image file can trigger stbi__load_gif_main_outofmem
attempt to
double-free the out variable. This happens in stbi__load_gif_main
because
when the layers * stride
value is zero the behavior is implementation
defined, but common that realloc frees the old memory and returns null
pointer. Since it attempts to double-free the memory a few lines below the
first βfreeβ, the issue can be potentially exploited only in a
multi-threaded environment. In the worst case this may lead to code
execution.
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6993-L6995
launchpad.net/bugs/cve/CVE-2023-45664
nvd.nist.gov/vuln/detail/CVE-2023-45664
security-tracker.debian.org/tracker/CVE-2023-45664
securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
www.cve.org/CVERecord?id=CVE-2023-45664