Integer Overflow or Wraparound Affecting opencv package, versions >=0.0.0, <3.3.1


0.0
high

Snyk CVSS

    Attack Complexity Low
    User Interaction Required
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.89% (83rd percentile)
Expand this section
NVD
8.8 high
Expand this section
Red Hat
3.3 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-COCOAPODS-OPENCV-470907
  • published 2 Oct 2019
  • disclosed 14 Aug 2017
  • credit Unknown

How to fix?

Upgrade OpenCV to version 3.3.1 or higher.

Overview

OpenCV is an OpenCV (Computer Vision) for iOS

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. OpenCV is vulnerable to integer overflows. The ReadNumber function doesn't check the input length, allowing attackers to leverage this overflow to cause remote code execution (RCE) and denial of service (DoS) attacks.