An out-of-bounds write vulnerability exists in the OpenImageIO::add_exif_item_to_spec functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially-crafted exif metadata can lead to stack-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
A function returns the address of a stack variable, which will cause unintended program behavior, typically in the form of a crash.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636 | third party advisory exploit |
https://www.debian.org/security/2023/dsa-5384 | third party advisory |
https://security.gentoo.org/glsa/202305-33 | |
https://lists.debian.org/debian-lts-announce/2023/08/msg00005.html |