Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28576: n/a

0
Medium
VulnerabilityCVE-2024-28576cvecve-2024-28576
Published: Wed Mar 20 2024 (03/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the opj_j2k_tcp_destroy() function when reading images in J2K format.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:23:37 UTC

Technical Analysis

CVE-2024-28576 identifies a buffer overflow vulnerability in the FreeImage open source library version 3.19.0, specifically within the opj_j2k_tcp_destroy() function responsible for handling J2K (JPEG 2000) image format files. The vulnerability arises due to improper bounds checking when freeing or destroying TCP-related structures during image decoding, leading to a buffer overflow condition. This flaw can be triggered by a local attacker who can supply or manipulate J2K images processed by applications using the vulnerable FreeImage version. The overflow can cause the application to crash, resulting in a denial of service (DoS) condition. According to the CVSS v3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), exploitation requires local access with low privileges and no user interaction, with a low attack complexity. The vulnerability affects availability only, with no direct impact on confidentiality or integrity. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-120 (Classic Buffer Overflow).

Potential Impact

The primary impact of CVE-2024-28576 is denial of service, which can disrupt applications or services relying on FreeImage for processing J2K images. This can lead to application crashes, potentially affecting user experience, automated image processing workflows, or systems that depend on FreeImage for image rendering or conversion. Since exploitation requires local access, the threat is limited to environments where untrusted or semi-trusted users have the ability to supply or process J2K images. This could include shared workstations, development environments, or multi-user systems. The lack of confidentiality or integrity impact reduces the risk of data breaches or unauthorized data modification. However, repeated or targeted exploitation could degrade system availability, impacting operational continuity. Organizations using FreeImage in critical imaging or media processing pipelines may face interruptions or require incident response to recover from crashes.

Mitigation Recommendations

To mitigate CVE-2024-28576, organizations should first restrict local access to systems processing J2K images with FreeImage 3.19.0, limiting the ability of untrusted users to supply or manipulate such images. Implement strict file validation and sandboxing for image processing applications to contain potential crashes. Monitor application logs and system stability for signs of abnormal termination or crashes related to image handling. Where possible, replace or upgrade FreeImage to a version that addresses this vulnerability once a patch is released. Until patches are available, consider disabling support for J2K image formats if not essential. Employ application whitelisting and endpoint protection to detect anomalous behavior. For developers, review and harden image parsing code to prevent buffer overflows and conduct fuzz testing on image inputs. Maintain an incident response plan to quickly recover from potential DoS events caused by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d93b7ef31ef0b588d2b

Added to database: 2/25/2026, 9:45:55 PM

Last enriched: 2/28/2026, 10:23:37 AM

Last updated: 4/12/2026, 3:46:46 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses