OpenCV there are two serious security vulnerabilities

Cisco Talos researchers in OpenCV version 4.1.0 found two buffer overflow vulnerabilities that CVE-2019-5063 (CVSS score 8.8) and CVE-2019-5064 (CVSS score 8.8).

OpenCV (Open Source Computer Vision) is a programming library of functions, mainly for real-time computer vision. [1] It was originally developed by Intel, and later got Willow Garage and Itseez (later Intel [2] acquisition) support. The library is cross-platform, free use under an open source BSD license.

OpenCV supports deep learning framework TensorFlow, Torch / PyTorch and Caffe.

Including Google, Yahoo, Microsoft, Intel, IBM, Sony, Honda, Toyota and other major technology companies, including the use of the library to develop facial recognition technology, robotics, motion tracking and other solutions.

In-depth understanding of OpenCV + Python histogram equalization

Presence of an available data structure OpenCV 4.1.0 persistence function heap buffer overflow vulnerability. Special JSON file can cause a buffer overflow, leading to multiple heap corruption and potentially execute code. An attacker could provide a specially crafted document to trigger this vulnerability.

The first vulnerability CVE-2019-5063 (CVSS score 8.8) heap buffer overflow vulnerabilities, it exists in the data structure OpenCV 4.1.0 persistence function. Exploit this vulnerability, developers can write to OpenCV, it can also read files from it.

According to Talos saying, quote and encountered "&" XML file character of potential character entities included in the analysis, API will continue to extract alpha-numeric characters until the semicolon. If any of the string and the string switch statement does not match, the data is copied to the buffer.

This allows the attacker to create a special XML file and trigger a buffer overflow, leading to multiple heap corruption and potential code execution.

Talos explained that the structure of the data persistence capabilities second vulnerability CVE-2019-5064 (CVSS score 8.8) is also located in the library, you can use a special JSON file trigger.

Both vulnerabilities are found in OpenCV 4.1.0 and supplier in July 2019 report. Released by the end of 2019, 12 OpenCV 4.2.0 release resolves these two buffer overflow vulnerabilities.

Guess you like

Origin www.linuxidc.com/Linux/2020-01/161972.htm