First published: Fri Jan 03 2020(Updated: )
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0. A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opencv Opencv | =4.1.0 | |
Oracle Application Testing Suite | =13.3.0.1 | |
Oracle Big Data Spatial And Graph | <2.0 | |
Oracle Enterprise Manager Base Platform | =13.4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2019-5063.
CVE-2019-5063 has a severity of 8.8 (high).
OpenCV 4.1.0, Oracle Application Testing Suite 13.3.0.1, Oracle Big Data Spatial And Graph up to version 2.0, and Oracle Enterprise Manager Base Platform 13.4.0.0 are affected by CVE-2019-5063.
A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution.
Yes, please refer to the following references for patches and fixes: [TALOS-2019-0852](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852), [Oracle CPU Jul 2021](https://www.oracle.com/security-alerts/cpujul2021.html), [Oracle CPU Apr 2021](https://www.oracle.com/security-alerts/cpuApr2021.html).