Buffer Overflow Affecting opencv package, versions <4.2.0+dfsg-3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.33% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-OPENCV-1555452
  • published4 Jan 2020
  • disclosed3 Jan 2020

Introduced: 3 Jan 2020

CVE-2019-5063  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Debian:12 opencv to version 4.2.0+dfsg-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream opencv package and not the opencv package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0. A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability.

CVSS Scores

version 3.1