Stack-based Buffer Overflow Affecting dcraw package, versions *


Severity

Recommended
0.0
low
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.69% (81st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS6-DCRAW-1996344
  • published26 Jul 2021
  • disclosed18 Aug 2018

Introduced: 18 Aug 2018

CVE-2018-19655  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

There is no fixed version for Centos:6 dcraw.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dcraw package and not the dcraw package as distributed by Centos. See How to fix? for Centos:6 relevant fixed versions and status.

A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.