There is a vulnerability in htmldoc 1.9.16. In imageloadjpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpegreadscanlines function.
{ "vanir_signatures": [ { "source": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-27114-973186cc", "digest": { "line_hashes": [ "22248037274654815650576322048949287649", "296267264495823945779616527713243343029", "54805180142347034579293677483579791376", "20168580982717471945539945481714769220", "161029606450311038018640252069572140345", "44015766389042975539425594357402522582", "199150106324938499033452393139848187681", "319593469495359680306054830735473771766", "199852375355020133944898896514129910403", "216794987705941529715646134661982004094", "297929791160051720547755394787491271325", "7171333243352453904152759386472981638", "51235282975610117606622240123798757686", "139219188293486094321898282517797944219", "95795465467944516194981923126261552544", "187404233367137448172080560522809448340", "260172315706847100484704933799299393600", "74720969679059144997190065584026944843", "268732769885590353792037465098898972395", "281414488574503611417848351362295128022", "138700746721977183646352493457492251959" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "htmldoc/image.cxx" } }, { "source": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-27114-9bd92723", "digest": { "function_hash": "241568264683061213505846123332327175641", "length": 1959.0 }, "signature_type": "Function", "target": { "file": "htmldoc/image.cxx", "function": "image_load_gif" } }, { "source": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-27114-dd877a75", "digest": { "function_hash": "73575095114162104851611625724241060175", "length": 1690.0 }, "signature_type": "Function", "target": { "file": "htmldoc/image.cxx", "function": "image_load_jpeg" } }, { "source": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-27114-ef3bc290", "digest": { "function_hash": "92107085259171046339019667125662630305", "length": 4174.0 }, "signature_type": "Function", "target": { "file": "htmldoc/image.cxx", "function": "image_load_png" } }, { "source": "https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275", "deprecated": false, "signature_version": "v1", "id": "CVE-2022-27114-f8105265", "digest": { "function_hash": "206302635082091458458529011910038932243", "length": 4392.0 }, "signature_type": "Function", "target": { "file": "htmldoc/image.cxx", "function": "image_load_bmp" } } ] }