CVE-2023-0996Classic Buffer Overflow in Libheif

Severity
7.8HIGHNVD
OSV8.8
EPSS
0.2%
top 59.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24
Latest updateJun 25

Description

There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/libheif< libheif 1.15.1-1 (bookworm)
Debianstruktur/libheif< 1.11.0-1+deb11u2+3
Ubuntustruktur/libheif< 1.1.0-2ubuntu0.1~esm1+2
CVEListV5struktur/libheif1.14.2
NVDstruktur/libheif1.14.2

Patches

🔴Vulnerability Details

4
OSV
libheif vulnerabilities2024-06-25
CVEList
CVE-2023-0996: There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif2023-02-24
OSV
CVE-2023-0996: There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif2023-02-24
GHSA
GHSA-3hqh-h748-xjx8: There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif2023-02-24

📋Vendor Advisories

2
Ubuntu
libheif vulnerabilities2024-06-25
Debian
CVE-2023-0996: libheif - There is a vulnerability in the strided image data parsing code in the emscripte...2023