
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A vulnerability (CVE-2024-32035) was discovered in the ImageSharp library, affecting versions prior to 2.1.8 and 3.1.4. The vulnerability allows processing of specially crafted files that can lead to excessive memory usage in image decoders, potentially causing denial of service (DoS) through process memory depletion (GitHub Advisory).
The vulnerability is related to memory allocation with excessive size values (CWE-789) in the image processing pipeline. When ImageSharp attempts to process specially crafted image files, it can lead to uncontrolled memory consumption. The issue has been assigned a CVSS v3.1 base score of 5.3 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating it can be exploited remotely without requiring privileges or user interaction (GitHub Advisory).
The vulnerability can be exploited to cause a denial of service (DoS) by depleting process memory, affecting applications and services that rely on ImageSharp for image processing tasks. This can lead to reduced availability of the affected systems (GitHub Advisory).
The vulnerability has been patched in versions 2.1.8 and 3.1.4. Users are strongly advised to upgrade to these versions. As a workaround, before calling Image.Decode(Async), users can use Image.Identify to determine the image dimensions to enforce a limit. Additionally, implementing authentication (such as HMAC), offloading to separate services/containers, using a reverse proxy, implementing rate limiting, and imposing conservative allocation limits through custom MemoryAllocator configuration are recommended security measures (ImageSharp Docs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”