Vulnerability Description
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openimageio | Openimageio | 2.4.4.2 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://security.gentoo.org/glsa/202305-33
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656ExploitThird Party Advisory
- https://www.debian.org/security/2023/dsa-5384Third Party Advisory
- https://security.gentoo.org/glsa/202305-33
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656ExploitThird Party Advisory
- https://www.debian.org/security/2023/dsa-5384Third Party Advisory
FAQ
What is CVE-2022-43599?
CVE-2022-43599 is a vulnerability with a CVSS score of 8.1 (HIGH). Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer over...
How severe is CVE-2022-43599?
CVE-2022-43599 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43599?
Check the references section above for vendor advisories and patch information. Affected products include: Openimageio Openimageio, Debian Debian Linux.