First published: Fri Oct 20 2023(Updated: )
stb_image is a single file MIT licensed library for processing images. The stbi__getn function reads a specified number of bytes from context (typically a file) into the specified buffer. In case the file stream points to the end, it returns zero. There are two places where its return value is not checked: In the `stbi__hdr_load` function and in the `stbi__tga_load` function. The latter of the two is likely more exploitable as an attacker may also control the size of an uninitialized buffer.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings Stb Image.h | =2.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45663 refers to a vulnerability in the stb_image library that allows for the disclosure of uninitialized memory when processing TGA image files.
CVE-2023-45663 has a severity rating of 5.3, which is considered medium.
The Nothings Stb Image.h library version 2.28 is affected by CVE-2023-45663.
CVE-2023-45663 affects the stb_image library by allowing an attacker to access uninitialized memory when processing certain TGA image files.
Yes, the fix for CVE-2023-45663 is available in the latest version of the stb_image library. It is recommended to update to the latest version to mitigate the vulnerability.