CVE-2022-41981

A stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openimageio:openimageio:2.3.19.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-12-22 22:15

Updated : 2023-07-17 17:15


NVD link : CVE-2022-41981

Mitre link : CVE-2022-41981

CVE.ORG link : CVE-2022-41981


JSON object : View

Products Affected

openimageio

  • openimageio

debian

  • debian_linux
CWE
CWE-121

Stack-based Buffer Overflow

CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write