First published: Thu Dec 22 2022(Updated: )
An out-of-bounds write vulnerability exists in the OpenImageIO::add_exif_item_to_spec functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially-crafted exif metadata can lead to stack-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openimageio Openimageio | =2.4.4.2 | |
Debian Debian Linux | =11.0 | |
debian/openimageio | <=2.0.5~dfsg0-1 | 2.0.5~dfsg0-1+deb10u2 2.2.10.1+dfsg-1+deb11u1 2.4.7.1+dfsg-2 2.4.14.0+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41837 is an out-of-bounds write vulnerability in OpenImageIO Project OpenImageIO v2.4.4.2.
CVE-2022-41837 can lead to stack-based memory corruption in OpenImageIO.
CVE-2022-41837 has a severity rating of critical with a CVSS score of 9.8.
OpenImageIO v2.4.4.2 and Debian Linux 11.0 are affected by CVE-2022-41837.
Apply the latest security updates provided by OpenImageIO and Debian to fix CVE-2022-41837.