CVE-2023-2618

Source
https://cve.org/CVERecord?id=CVE-2023-2618
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2618.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-2618
Downstream
Published
2023-05-10T05:31:04.406Z
Modified
2026-05-18T05:57:03.207255763Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeHanziSegment memory leak
Details

A vulnerability, which was classified as problematic, has been found in OpenCV wechatqrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decodedbitstreamparser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.

Database specific
{
    "cwe_ids": [
        "CWE-401"
    ],
    "cna_assigner": "VulDB",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/2xxx/CVE-2023-2618.json"
}
References

Affected packages

Git / github.com/opencv/opencv

Affected ranges

Type
GIT
Repo
https://github.com/opencv/opencv
Events
Database specific
{
    "extracted_events": [
        {
            "introduced": "4.5.2"
        },
        {
            "fixed": "4.8.0"
        }
    ],
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*"
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2618.json"

Git / github.com/opencv/opencv_contrib

Affected ranges

Type
GIT
Repo
https://github.com/opencv/opencv_contrib
Events
Database specific
{
    "extracted_events": [
        {
            "introduced": "4.5.2"
        },
        {
            "fixed": "4.8.0"
        }
    ],
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*"
}

Affected versions

4.*
4.5.2
4.5.3
4.5.4
4.5.5
4.6.0
4.7.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2618.json"