Vulnerability Description
A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freeimage Project | Freeimage | - |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2313704Issue TrackingThird Party Advisory
- https://sourceforge.net/p/freeimage/bugs/351/ExploitIssue Tracking
FAQ
What is CVE-2024-9029?
CVE-2024-9029 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of ...
How severe is CVE-2024-9029?
CVE-2024-9029 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9029?
Check the references section above for vendor advisories and patch information. Affected products include: Freeimage Project Freeimage.