-
Notifications
You must be signed in to change notification settings - Fork 291
/
GHSA-267x-w5hx-8hjr.json
102 lines (102 loc) · 2.46 KB
/
GHSA-267x-w5hx-8hjr.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
{
"schema_version": "1.4.0",
"id": "GHSA-267x-w5hx-8hjr",
"modified": "2021-11-18T15:30:14Z",
"published": "2021-10-12T22:02:45Z",
"aliases": [
"CVE-2017-12864"
],
"summary": "Integer Overflow or Wraparound in OpenCV",
"details": "In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding with OpenCV-Python version 3.3.0.9) and earlier.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "opencv-python"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1.11"
}
]
}
],
"database_specific": {
"last_known_affected_version_range": "<= 3.3.0.9"
}
},
{
"package": {
"ecosystem": "PyPI",
"name": "opencv-contrib-python"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1.11"
}
]
}
],
"database_specific": {
"last_known_affected_version_range": "<= 3.3.0.9"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12864"
},
{
"type": "WEB",
"url": "https://github.com/opencv/opencv/issues/9372"
},
{
"type": "WEB",
"url": "https://github.com/opencv/opencv/pull/9376"
},
{
"type": "PACKAGE",
"url": "https://github.com/opencv/opencv-python"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201712-02"
}
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2021-10-07T20:35:35Z",
"nvd_published_at": "2017-08-15T16:29:00Z"
}
}