{"id":"UBUNTU-CVE-2023-47994","details":"An integer overflow vulnerability in LoadPixelDataRLE4 function in PluginBMP.cpp in Freeimage 3.18.0 allows attackers to obtain sensitive information, cause a denial of service and/or run arbitrary code.","modified":"2026-01-20T17:41:57.406320Z","published":"2024-01-09T23:15:00Z","upstream":["CVE-2023-47994"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-47994"},{"type":"REPORT","url":"https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-47994"}],"affected":[{"package":{"name":"freeimage","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.15.4-3ubuntu0.1+esm3?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.15.1-2build1","3.15.1-2build2","3.15.4-2","3.15.4-3","3.15.4-3ubuntu0.1","3.15.4-3ubuntu0.1+esm1","3.15.4-3ubuntu0.1+esm2","3.15.4-3ubuntu0.1+esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.15.4-3ubuntu0.1+esm3"},{"binary_name":"libfreeimage3","binary_version":"3.15.4-3ubuntu0.1+esm3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.17.0+ds1-2ubuntu0.1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.15.4-4.1build1","3.15.4-6","3.17.0+ds1-1.1","3.17.0+ds1-2","3.17.0+ds1-2ubuntu0.1","3.17.0+ds1-2ubuntu0.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.17.0+ds1-2ubuntu0.1+esm1"},{"binary_name":"libfreeimage3","binary_version":"3.17.0+ds1-2ubuntu0.1+esm1"},{"binary_name":"libfreeimageplus-dev","binary_version":"3.17.0+ds1-2ubuntu0.1+esm1"},{"binary_name":"libfreeimageplus3","binary_version":"3.17.0+ds1-2ubuntu0.1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.17.0+ds1-5+deb9u1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.17.0+ds1-5build2","3.17.0+ds1-5+deb9u1build0.18.04.1","3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"},{"binary_name":"libfreeimage3","binary_version":"3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"},{"binary_name":"libfreeimageplus-dev","binary_version":"3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"},{"binary_name":"libfreeimageplus3","binary_version":"3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-1ubuntu3.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-1ubuntu1","3.18.0+ds2-1ubuntu2","3.18.0+ds2-1ubuntu3","3.18.0+ds2-1ubuntu3.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.18.0+ds2-1ubuntu3.1"},{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-1ubuntu3.1"},{"binary_name":"libfreeimageplus-dev","binary_version":"3.18.0+ds2-1ubuntu3.1"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-1ubuntu3.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-6ubuntu5.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-6ubuntu3","3.18.0+ds2-6ubuntu4","3.18.0+ds2-6ubuntu5","3.18.0+ds2-6ubuntu5.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.18.0+ds2-6ubuntu5.1"},{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-6ubuntu5.1"},{"binary_name":"libfreeimageplus-dev","binary_version":"3.18.0+ds2-6ubuntu5.1"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-6ubuntu5.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-10build4?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-9.1","3.18.0+ds2-10","3.18.0+ds2-10build2","3.18.0+ds2-10build3","3.18.0+ds2-10build4"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.18.0+ds2-10build4"},{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-10build4"},{"binary_name":"libfreeimageplus-dev","binary_version":"3.18.0+ds2-10build4"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-10build4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-11?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-11"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage-dev","binary_version":"3.18.0+ds2-11"},{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-11"},{"binary_name":"libfreeimageplus-dev","binary_version":"3.18.0+ds2-11"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-11"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47994.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}