Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/134573/LibRaw-0.17-Overflow.html | third party advisory vdb entry |
http://www.libraw.org/news/libraw-0-17-1 | vendor advisory |
http://seclists.org/fulldisclosure/2015/Nov/108 | third party advisory mailing list |