A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service.
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2313704 | issue tracking |
https://sourceforge.net/p/freeimage/bugs/351/ |