First published: Wed Mar 20 2024(Updated: )
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the read_iptc_profile() function when reading images in TIFF format.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeImage | =3.19.0 | |
FreeImage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28568 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2024-28568, upgrade FreeImage to a patched version that addresses the buffer overflow issue.
The vulnerability CVE-2024-28568 affects FreeImage version 3.19.0.
The read_iptc_profile() function is the specific function vulnerable in CVE-2024-28568.
A local attacker can exploit CVE-2024-28568 to cause a denial of service through crafted TIFF images.