First published: Wed Mar 20 2024(Updated: )
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the ReadData() function when reading images in RAS format.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeImage | =3.19.0 | |
FreeImage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-28580 is classified as critical due to its potential for arbitrary code execution.
To fix CVE-2024-28580, update FreeImage to version 3.19.1 or later, which addresses the buffer overflow vulnerability.
Users of FreeImage version 3.19.0 are affected by CVE-2024-28580, particularly those using the ReadData() function with RAS format images.
CVE-2024-28580 can be exploited by local attackers to execute arbitrary code on the vulnerable system.
No, CVE-2024-28580 is a local exploit risk, as it requires local access to the system to execute the attack.