
Cloud Vulnerability DB
A community-led vulnerabilities database
The Imager package before 1.025 for Perl contains a heap-based buffer overflow vulnerability (CVE-2024-53901). The vulnerability is triggered when the trim() method is called on a crafted input image, which can lead to denial of service or potentially other unspecified impacts. The issue was discovered in November 2024 and fixed in version 1.025 (CPAN Changes).
The vulnerability is classified as a heap-based buffer overflow (CWE-787: Out-of-bounds Write) with a CVSS v3.1 base score of 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H). The issue occurs specifically in the trim() method implementation where a buffer is incorrectly sized, leading to potential memory corruption when processing specially crafted input images (NVD).
The primary confirmed impact is denial of service through application crashes. When exploited, the vulnerability can cause invalid memory operations leading to program termination. There are also potential unspecified additional impacts that have not been fully detailed (NVD).
The vulnerability has been fixed in Imager version 1.025. Users should upgrade to this version or later to address the issue. The fix involves correcting the buffer sizing in the trim() method implementation (CPAN Changes).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."