Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tNDNjLTY0OW0tcG00OM0WTA
Integer Overflow or Wraparound in OpenCV.
In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 (corresponding with OpenCV-Python 3.3.0.9) and earlier.
Permalink: https://github.com/advisories/GHSA-m43c-649m-pm48JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tNDNjLTY0OW0tcG00OM0WTA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago
CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Percentage: 0.01253
EPSS Percentile: 0.85288
Identifiers: GHSA-m43c-649m-pm48, CVE-2017-1000450
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-1000450
- https://github.com/opencv/opencv/issues/9723
- https://github.com/opencv/opencv/pull/9726/commits/c58152d94ba878b2d7d76bcac59146312199b9eb
- https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor
- https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html
- https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html
- https://github.com/advisories/GHSA-m43c-649m-pm48
Blast Radius: 42.5
Affected Packages
pypi:opencv-contrib-python
Dependent packages: 321Dependent repositories: 8,355
Downloads: 1,880,832 last month
Affected Version Ranges: <= 3.3.0.9
Fixed in: 3.3.1.11
All affected versions:
All unaffected versions:
pypi:opencv-python
Dependent packages: 3,545Dependent repositories: 67,670
Downloads: 11,943,282 last month
Affected Version Ranges: <= 3.3.0.9
Fixed in: 3.3.1.11
All affected versions:
All unaffected versions: 3.1.0