An out-of-bounds write vulnerability exists when reading a JPG file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists with parsing JPG files. Crafted data in a JPG (4 extraneous bytes before the marker 0xca) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.opendesign.com/security-advisories | vendor advisory |