First published: Wed Jun 02 2021(Updated: )
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libraw Libraw | <0.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-24870.
The severity of CVE-2020-24870 is high with a CVSS score of 8.8.
The affected software is Libraw before version 0.20.1.
The stack buffer overflow can be triggered through the LibRaw::identify_process_dng_fields function in identify.cpp.
Yes, a fix is available for this vulnerability in version 0.20.1 of Libraw.