First published: Wed Jun 28 2023(Updated: )
A vulnerability was found in OpenImageIO, where a heap buffer overflow exists in the src/gif.imageio/gifinput.cpp file. This flaw allows a remote attacker to pass a specially crafted file to the application, which triggers a heap-based buffer overflow and could cause a crash, leading to a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/OpenImageIO | <2.4.12.0 | 2.4.12.0 |
All of | ||
OpenImageIO | =2.4.11 | |
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-3430 is considered high due to the potential for remote exploitation through a heap buffer overflow.
To fix CVE-2023-3430, upgrade OpenImageIO to version 2.4.12.0 or later.
OpenImageIO versions prior to 2.4.12.0, specifically 2.4.11, are affected by CVE-2023-3430.
Yes, CVE-2023-3430 can cause a denial of service by triggering a crash in the application due to the buffer overflow.
CVE-2023-3430 specifically impacts the gifimageio component within OpenImageIO, located in gifinput.cpp.