CVE-2015-3885Improper Input Validation in Project Dcraw

Severity
4.3MEDIUMNVD
EPSS
3.6%
top 12.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 19
Latest updateMay 14

Description

Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages5 packages

Debiandcraw_project/dcraw< 9.26-1+3
Debianfreeimage_project/freeimage< 3.15.4-6+3
Debiankodi/kodi< 16.0+dfsg1-1+2
Debianlibraw/libraw< 0.16.2-1+3

Also affects: Fedora 21

🔴Vulnerability Details

3
GHSA
GHSA-gxxm-8rj8-v8q7: Integer overflow in the ljpeg_start function in dcraw 72022-05-14
OSV
CVE-2015-3885: Integer overflow in the ljpeg_start function in dcraw 72015-05-19
CVEList
CVE-2015-3885: Integer overflow in the ljpeg_start function in dcraw 72015-05-19

📋Vendor Advisories

3
Ubuntu
LibRaw vulnerabilities2017-11-22
Red Hat
dcraw: input sanitization flaw leading to buffer overflow2015-05-11
Debian
CVE-2015-3885: darktable - Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows re...2015

💬Community

12
Bugzilla
CVE-2015-3885 netpbm: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]2015-05-19
Bugzilla
CVE-2015-3885 mingw-cximage: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]2015-05-13
Bugzilla
CVE-2015-3885 rawtherapee: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]2015-05-13
Bugzilla
CVE-2015-3885 libkdcraw: dcraw: input sanitization flaw leading to buffer overflow [epel-5]2015-05-13
Bugzilla
CVE-2015-3885 libraw1394: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]2015-05-13
CVE-2015-3885 — Improper Input Validation | cvebase