Vulnerability Description
Buffer Overflow vulnerability in WEBP_Support.cpp in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted webp file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exempi Project | Exempi | <= 2.5.0 |
Related Weaknesses (CWE)
References
- https://gitlab.freedesktop.org/libopenraw/exempi/commit/acee2894ceb91616543927c2Patch
- https://gitlab.freedesktop.org/libopenraw/exempi/issues/12ExploitIssue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html
- https://gitlab.freedesktop.org/libopenraw/exempi/commit/acee2894ceb91616543927c2Patch
- https://gitlab.freedesktop.org/libopenraw/exempi/issues/12ExploitIssue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html
FAQ
What is CVE-2020-18652?
CVE-2020-18652 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Buffer Overflow vulnerability in WEBP_Support.cpp in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted webp file.
How severe is CVE-2020-18652?
CVE-2020-18652 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-18652?
Check the references section above for vendor advisories and patch information. Affected products include: Exempi Project Exempi.