VYPR
High severityNVD Advisory· Published Jan 2, 2018· Updated Aug 5, 2024

CVE-2017-1000450

CVE-2017-1000450

Description

In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 and earlier.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Integer overflow in OpenCV's FillUniColor/FillUniGray functions can lead to remote code execution or denial of service via crafted images.

Vulnerability

In OpenCV version 3.3 and earlier, the functions FillUniColor and FillUniGray in modules/imgcodecs/src/utils.cpp do not validate the length of input data during image decoding, leading to an integer overflow. This flaw is reachable when the library processes images from untrusted sources, such as remote downloads. Affected versions include all OpenCV releases up to and including 3.3 [1][2][4].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious image file that triggers the integer overflow during decoding. No authentication is required; the victim only needs to process the image (e.g., via cv::imread). The provided proof-of-concept demonstrates that calling cv::imread on a specially crafted file causes an out-of-bounds write, leading to a segmentation fault [3][4].

Impact

Successful exploitation can result in memory corruption, potentially enabling denial of service via application crash. If the image is loaded from a remote source, the attacker may achieve remote code execution, gaining arbitrary control over the affected system [1][2].

Mitigation

OpenCV released fixed versions starting from 3.4. Users should upgrade to OpenCV 3.4 or later. As of the publication date, no workaround is documented for earlier releases; upgrading is the recommended action [1][2][4].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
opencv-pythonPyPI
< 3.3.1.113.3.1.11
opencv-contrib-pythonPyPI
< 3.3.1.113.3.1.11

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.