[Secure-testing-team] Bug#786783: ufraw: CVE-2015-3885: input sanitization flaw leading to buffer overflow

Salvatore Bonaccorso carnil at debian.org
Mon May 25 14:40:00 UTC 2015


Source: ufraw
Version: 0.18-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for ufraw.

CVE-2015-3885[0]:
| Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier
| allows remote attackers to cause a denial of service (crash) via a
| crafted image, which triggers a buffer overflow, related to the len
| variable.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3885
[1] http://www.ocert.org/advisories/ocert-2015-006.html

Regards,
Salvatore



More information about the Secure-testing-team mailing list