CVE-2017-12864
Publication date 15 August 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.
From the Ubuntu Security Team
It was discovered that OpenCV incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or other unspecified impact.
Status
Package | Ubuntu Release | Status |
---|---|---|
opencv | 18.04 LTS bionic |
Fixed 3.2.0+dfsg-4ubuntu0.1
|
16.04 LTS xenial |
Fixed 2.4.9.1+dfsg-1.5ubuntu1.1
|
|
14.04 LTS trusty |
Fixed 2.4.8+dfsg1-2ubuntu1.1
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |