CVE-2022-41981 — Stack-based Buffer Overflow in Openimageio
Severity
8.1HIGHNVD
EPSS
0.4%
top 41.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 22
Latest updateDec 23
Description
A stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages4 packages
Also affects: Debian Linux 11.0
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2022-41981: openimageio - A stack-based buffer overflow vulnerability exists in the TGA file format parser...↗2022
🕵️Threat Intelligence
2Talos▶
Vulnerability Spotlight: OpenImageIO file processing issues could lead to arbitrary code execution, sensitive information leak and denial of service↗2022-12-22
Talos▶
Vulnerability Spotlight: OpenImageIO file processing issues could lead to arbitrary code execution, sensitive information leak and denial of service↗2022-12-22