CVE-2019-5064
03.01.2020, 17:15
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
Vendor | Product | Version |
---|---|---|
opencv | opencv | 4.0.0 ≤ 𝑥 < 4.2.0 |
oracle | application_testing_suite | 13.3.0.1 |
oracle | big_data_spatial_and_graph | 𝑥 < 2.0 |
oracle | enterprise_manager_base_platform | 13.4.0.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
References