Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted psd file.
References
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFRQ76ZDPSWT7OH6FJDLSFWBXVBE6JDN/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6GKMK74POW3RU7F4HLUJE7XEFLQDO35/ - | |
References | () https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ - Exploit | |
Summary |
|
Information
Published : 2023-08-22 19:16
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24293
Mitre link : CVE-2020-24293
CVE.ORG link : CVE-2020-24293
JSON object : View
Products Affected
freeimage_project
- freeimage
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')