CVE-2015-3885
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
19/05/2015
Last modified:
12/04/2025
Description
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dcraw_project:dcraw:*:*:*:*:*:*:*:* | 7.00 (including) | |
| cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html
- http://www.ocert.org/advisories/ocert-2015-006.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/archive/1/535513/100/0/threaded
- http://www.securityfocus.com/bid/74590
- https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5
- https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e
- https://security.gentoo.org/glsa/201701-54
- https://security.gentoo.org/glsa/201706-17
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html
- http://www.ocert.org/advisories/ocert-2015-006.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/archive/1/535513/100/0/threaded
- http://www.securityfocus.com/bid/74590
- https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5
- https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e
- https://security.gentoo.org/glsa/201701-54
- https://security.gentoo.org/glsa/201706-17



