First published: Fri Oct 20 2023(Updated: )
stb_image is a single file MIT licensed library for processing images. A crafted image file may trigger out of bounds memcpy read in `stbi__gif_load_next`. This happens because two_back points to a memory address lower than the start of the buffer out. This issue may be used to leak internal memory allocation information.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings Stb Image.h | =2.28 |
https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6817
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45661 is a vulnerability in the stb_image library that allows an attacker to trigger a memory read out of bounds in the stbi__gif_load_next function.
CVE-2023-45661 has a severity rating of 7.1 (high).
CVE-2023-45661 occurs because the two_back pointer points to a memory address lower than the start of the buffer out in the stbi__gif_load_next function.
The stb_image library versions 2.28 are affected by CVE-2023-45661.
Yes, a fix for CVE-2023-45661 is available. Please refer to the provided references for more information.