CVE-2020-15503Improper Input Validation in Libraw

Severity
7.5HIGHNVD
EPSS
3.9%
top 11.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 2
Latest updateNov 7

Description

LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

debiandebian/libraw< libraw 0.20.0-4 (bookworm)
Debianlibraw/libraw< 0.20.0-4+3
NVDlibraw/libraw0.19.5+1

Also affects: Debian Linux 10.0, Fedora 31, 32

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2w4r-7g95-jpmw: LibRaw before 02022-05-24
OSV
CVE-2020-15503: LibRaw before 02020-07-02

📋Vendor Advisories

4
Ubuntu
LibRaw vulnerabilities2022-11-07
Microsoft
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp postprocessing/mem_image.cpp and utils/thumb_utils.cpp. For example malloc(sizeof(libraw_processed_ima2020-07-14
Red Hat
LibRaw: lack of thumbnail size range check can lead to buffer overflow2020-06-22
Debian
CVE-2020-15503: libraw - LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders...2020

💬Community

3
Bugzilla
CVE-2020-15503 mingw-LibRaw: LibRaw: lack of thumbnail size range check can lead to buffer overflow [fedora-all]2020-07-02
Bugzilla
CVE-2020-15503 LibRaw: lack of thumbnail size range check can lead to buffer overflow [fedora-all]2020-07-02
Bugzilla
CVE-2020-15503 LibRaw: lack of thumbnail size range check can lead to buffer overflow2020-07-02