
Cloud Vulnerability DB
A community-led vulnerabilities database
There is an integer overflow vulnerability in dcraw (CVE-2021-3624) that affects the foveonloadcamf() function. When a victim opens a maliciously crafted X3F input image with dcraw, it could lead to a buffer overflow condition, potentially allowing arbitrary code execution (Debian Bug).
The vulnerability exists in the foveonloadcamf() function within dcraw.c. The issue occurs when the program reads data from the input image using get4() function without proper sanitization of variables. When type=4 is set along with sufficiently large values for 'wide' and 'high' variables, it can cause an integer overflow leading to insufficient memory allocation. This results in a buffer overrun when reading data into the allocated buffer (Debian Bug).
The vulnerability could allow an attacker to execute arbitrary code on the victim's system or cause program crashes when processing specially crafted X3F image files (Debian Bug).
The vulnerability has been fixed in dcraw version 9.28-3, which implements wrappers for fread(), fwrite(), and fseek() library functions that check return values and exit with a non-zero status if an input/output failure is detected (Debian Bug).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."