CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
23.6%
libstb.so is vulnerable to Information Disclosure. The stbi__getn
function reads a specified number of bytes from context into the specified buffer. When the file stream points to the end, it returns zero which allows a remote attacker to gain access to sensitive information via the exploitable stbi__hdr_loda
and stbi__tga_load
functions where the return value from stbi__getn
is not checked.
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1664
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L5936
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L5936C10-L5936C20
github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L7221
lists.fedoraproject.org/archives/list/[email protected]/message/NMXKOKPP4BKTNUTF5KSRDQAWOUILQZNO/
lists.fedoraproject.org/archives/list/[email protected]/message/QVABVF4GEM6BYD5L4L64RCRSXUHY6LGN/
lists.fedoraproject.org/archives/list/[email protected]/message/UVQ7ONFH5GWLMXYEAJG32A3EUKUCEVCR/
securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/#issue-3-disclosure-of-uninitialized-memory-in-stbi__tga_load-ghsl-2023-147