First published: Wed May 10 2023(Updated: )
A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opencv Opencv | <4.7.0 | |
>=4.5.2<4.8.0 |
https://github.com/opencv/opencv_contrib/pull/3484/commits/2b62ff6181163eea029ed1cab11363b4996e9cd6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2618.
The title of the vulnerability is 'OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeHanziSegment memory leak'.
The severity of CVE-2023-2618 is high with a CVSS score of 7.5.
CVE-2023-2618 affects OpenCV wechat_qrcode Module up to version 4.7.0.
To fix the CVE-2023-2618 vulnerability, it is recommended to update OpenCV to a version higher than 4.7.0.