First published: Wed Mar 20 2024(Updated: )
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the Imf_2_2::Xdr::read() function when reading images in EXR format.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeImage | =3.19.0 | |
FreeImage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28569 has a high severity rating due to its potential to allow local attackers to execute arbitrary code.
To fix CVE-2024-28569, it is recommended to update FreeImage to the latest version where the vulnerability has been patched.
CVE-2024-28569 affects FreeImage version 3.19.0 [r1909] when processing images in EXR format.
CVE-2024-28569 can be exploited by local attackers to execute arbitrary code through a buffer overflow condition.
As of now, there are no confirmed reports of active exploitation of CVE-2024-28569 in the wild.