Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28571: n/a

0
Medium
VulnerabilityCVE-2024-28571cvecve-2024-28571
Published: Wed Mar 20 2024 (03/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the fill_input_buffer() function when reading images in JPEG format.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:24:17 UTC

Technical Analysis

CVE-2024-28571 identifies a buffer overflow vulnerability in the FreeImage open source library version 3.19.0 [r1909], specifically within the fill_input_buffer() function responsible for reading JPEG image data. This vulnerability arises due to improper bounds checking when processing JPEG input, leading to an out-of-bounds read or write (classified under CWE-125: Out-of-bounds Read). A local attacker with at least low-level privileges can exploit this flaw by supplying a crafted JPEG image to an application that uses FreeImage for image processing. The exploitation results in a denial of service (DoS) condition by crashing the application or causing memory corruption that halts normal operation. The vulnerability does not allow for privilege escalation, code execution, or data leakage, but it disrupts service availability. The attack vector is local (AV:L), requiring the attacker to have access to the system where FreeImage is used. No user interaction is necessary once local access is obtained. The vulnerability has a CVSS v3.1 base score of 5.5, indicating medium severity. No patches or fixes have been officially released at the time of publication, and there are no known exploits in the wild. This vulnerability is relevant for any software or systems that embed FreeImage 3.19.0 and process JPEG images locally, including desktop applications, image processing tools, and potentially embedded devices relying on this library.

Potential Impact

The primary impact of CVE-2024-28571 is denial of service, which can disrupt availability of applications or services that rely on FreeImage for JPEG image processing. Organizations using FreeImage in critical image handling workflows may experience application crashes or service interruptions, potentially affecting productivity or user experience. Since exploitation requires local access, the risk is mitigated somewhat by the need for attacker presence on the system. However, in multi-user environments or shared systems, a low-privileged user could exploit this to disrupt other users or services. Embedded systems or devices that rely on FreeImage for image decoding could also be affected, possibly causing device instability. There is no direct impact on confidentiality or integrity, and no indication that remote exploitation or privilege escalation is possible. Overall, the threat is moderate but should be addressed to maintain system stability and prevent denial of service conditions.

Mitigation Recommendations

To mitigate CVE-2024-28571, organizations should first identify all software and systems using FreeImage version 3.19.0 [r1909], especially those processing JPEG images locally. Until an official patch is released, consider the following specific actions: 1) Restrict local access to trusted users only, minimizing the risk of local exploitation. 2) Implement strict input validation and sanitization on JPEG files before they are processed by FreeImage, potentially using alternative image validation tools or libraries to filter out malformed images. 3) Monitor application logs and system stability for signs of crashes or abnormal behavior related to image processing. 4) Where feasible, isolate image processing components in sandboxed or containerized environments to limit the impact of a crash. 5) Stay updated with FreeImage project announcements and apply patches promptly once available. 6) Consider upgrading to a later, unaffected version of FreeImage if available or replacing FreeImage with alternative libraries that do not exhibit this vulnerability. 7) For embedded devices, coordinate with vendors for firmware updates addressing this issue.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d92b7ef31ef0b588c66

Added to database: 2/25/2026, 9:45:54 PM

Last enriched: 2/26/2026, 11:24:17 AM

Last updated: 4/12/2026, 5:06:07 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses