First published: Fri Oct 20 2023(Updated: )
stb_image is a single file MIT licensed library for processing images. If `stbi__load_gif_main` in `stbi_load_gif_from_memory` fails it returns a null pointer and may keep the `z` variable uninitialized. In case the caller also sets the flip vertically flag, it continues and calls `stbi__vertical_flip_slices` with the null pointer result value and the uninitialized `z` value. This may result in a program crash.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings Stb Image.h | =2.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45667 is a vulnerability in the stb_image library that allows a null pointer dereference due to an uninitialized variable.
The severity of CVE-2023-45667 is high with a CVSS score of 7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-45667 impacts the stb_image library by allowing a null pointer dereference, which can lead to a crash or potentially allow an attacker to execute arbitrary code.
The affected version of the stb_image library is 2.28.
To fix CVE-2023-45667, it is recommended to update to a patched version of the stb_image library.