CVE Vulnerabilities

CVE-2020-35534

Uncontrolled Resource Consumption

Published: Sep 01, 2022 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In LibRaw, there is a memory corruption vulnerability within the crxFreeSubbandData() function (librawsrcdecoderscrx.cpp) when processing cr3 files.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
LibrawLibraw0.20.0 (including)0.20.0 (including)
LibrawLibraw0.20.0-rc2 (including)0.20.0-rc2 (including)
LibrawLibraw0.20.1 (including)0.20.1 (including)
LibrawLibraw0.20.2 (including)0.20.2 (including)
LibrawLibraw0.21.0-beta1 (including)0.21.0-beta1 (including)
DarktableUbuntubionic*
DarktableUbuntufocal*
DarktableUbuntukinetic*
DarktableUbuntulunar*
DarktableUbuntumantic*
DarktableUbuntuoracular*
DarktableUbuntuplucky*
DarktableUbuntutrusty*
DarktableUbuntuxenial*
DcrawUbuntubionic*
DcrawUbuntufocal*
DcrawUbuntukinetic*
DcrawUbuntulunar*
DcrawUbuntumantic*
DcrawUbuntuoracular*
DcrawUbuntuplucky*
DcrawUbuntutrusty*
DcrawUbuntuxenial*
DigikamUbuntubionic*
DigikamUbuntukinetic*
DigikamUbuntulunar*
DigikamUbuntumantic*
DigikamUbuntutrusty*
DigikamUbuntuupstream*
DigikamUbuntuxenial*
ExactimageUbuntubionic*
ExactimageUbuntufocal*
ExactimageUbuntukinetic*
ExactimageUbuntulunar*
ExactimageUbuntumantic*
ExactimageUbuntuoracular*
ExactimageUbuntuplucky*
ExactimageUbuntutrusty*
ExactimageUbuntuxenial*
KodiUbuntubionic*
KodiUbuntufocal*
KodiUbuntukinetic*
KodiUbuntulunar*
KodiUbuntumantic*
KodiUbuntuoracular*
KodiUbuntuplucky*
KodiUbuntuxenial*
LibrawUbuntutrusty*
LibrawUbuntuupstream*
LibrawUbuntuxenial*
RawtherapeeUbuntubionic*
RawtherapeeUbuntufocal*
RawtherapeeUbuntukinetic*
RawtherapeeUbuntulunar*
RawtherapeeUbuntumantic*
RawtherapeeUbuntuoracular*
RawtherapeeUbuntuplucky*
RawtherapeeUbuntutrusty*
RawtherapeeUbuntuxenial*
UfrawUbuntubionic*
UfrawUbuntutrusty*
UfrawUbuntuxenial*
XbmcUbuntutrusty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References