First published: Wed Mar 20 2024(Updated: )
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the readLine() function when reading images in XPM format.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeImage | =3.19.0 | |
FreeImage | =3.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28583 is classified as a high severity vulnerability due to its potential to allow local attackers to execute arbitrary code.
To fix CVE-2024-28583, update FreeImage to version 3.19.1 or later, which addresses the buffer overflow issue.
CVE-2024-28583 can enable local attackers to execute arbitrary code by exploiting the vulnerable readLine() function in FreeImage.
CVE-2024-28583 affects FreeImage version 3.19.0, specifically the r1909 release.
CVE-2024-28583 is a local vulnerability, meaning it requires local access for exploitation, and cannot be exploited remotely.