CVE-2020-15503

HIGH

Libraw < 0.19.5 - Improper Input Validation

Title source: rule
STIX 2.1

Description

LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.

References (12)

Core 12
Core References
Broken Link, Mailing List, Third Party Advisory vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html
Broken Link, Mailing List, Third Party Advisory vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/11/msg00042.html
Broken Link, Third Party Advisory
https://www.libraw.org/news/libraw-0-20-rc1

Scores

CVSS v3 7.5
EPSS 0.0387
EPSS Percentile 88.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-20
Status published
Products (5)
debian/debian_linux 10.0
fedoraproject/fedora 31
fedoraproject/fedora 32
libraw/libraw 0.20 beta1 (3 CPE variants)
libraw/libraw < 0.19.5
Published Jul 02, 2020
Tracked Since Feb 18, 2026