{"id":"UBUNTU-CVE-2024-28564","details":"Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the Imf_2_2::CharPtrIO::readChars() function when reading images in EXR format.","modified":"2026-04-22T14:48:17.273087Z","published":"2024-03-20T06:15:00Z","upstream":["CVE-2024-28564"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-28564"},{"type":"REPORT","url":"https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-28564"}],"affected":[{"package":{"name":"freeimage","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.15.4-3ubuntu0.1+esm3?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.15.1-2build1","3.15.1-2build2","3.15.4-2","3.15.4-3","3.15.4-3ubuntu0.1","3.15.4-3ubuntu0.1+esm1","3.15.4-3ubuntu0.1+esm2","3.15.4-3ubuntu0.1+esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.15.4-3ubuntu0.1+esm3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.17.0+ds1-2ubuntu0.1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.15.4-4.1build1","3.15.4-6","3.17.0+ds1-1.1","3.17.0+ds1-2","3.17.0+ds1-2ubuntu0.1","3.17.0+ds1-2ubuntu0.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.17.0+ds1-2ubuntu0.1+esm1"},{"binary_name":"libfreeimageplus3","binary_version":"3.17.0+ds1-2ubuntu0.1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.17.0+ds1-5+deb9u1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.17.0+ds1-5build2","3.17.0+ds1-5+deb9u1build0.18.04.1","3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"},{"binary_name":"libfreeimageplus3","binary_version":"3.17.0+ds1-5+deb9u1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-1ubuntu3.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-1ubuntu1","3.18.0+ds2-1ubuntu2","3.18.0+ds2-1ubuntu3","3.18.0+ds2-1ubuntu3.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-1ubuntu3.1"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-1ubuntu3.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-6ubuntu5.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-6ubuntu3","3.18.0+ds2-6ubuntu4","3.18.0+ds2-6ubuntu5","3.18.0+ds2-6ubuntu5.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-6ubuntu5.1"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-6ubuntu5.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-10build4?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-9.1","3.18.0+ds2-10","3.18.0+ds2-10build2","3.18.0+ds2-10build3","3.18.0+ds2-10build4"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-10build4"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-10build4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}},{"package":{"name":"freeimage","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/freeimage@3.18.0+ds2-11?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.18.0+ds2-11"],"ecosystem_specific":{"binaries":[{"binary_name":"libfreeimage3","binary_version":"3.18.0+ds2-11"},{"binary_name":"libfreeimageplus3","binary_version":"3.18.0+ds2-11"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28564.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}