Vulnerability Description
Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libraw | Libraw | <= 0.15.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/53547Vendor Advisory
- http://www.libraw.org/news/libraw-0-15-1
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21dExploitPatch
- http://secunia.com/advisories/53547Vendor Advisory
- http://www.libraw.org/news/libraw-0-15-1
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21dExploitPatch
FAQ
What is CVE-2013-2127?
CVE-2013-2127 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vect...
How severe is CVE-2013-2127?
CVE-2013-2127 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2127?
Check the references section above for vendor advisories and patch information. Affected products include: Libraw Libraw.