An out-of-bounds write vulnerability exists when reading a JPG file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists with parsing JPG files. Crafted data in a JPG (4 extraneous bytes before the marker 0xca) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.opendesign.com/security-advisories |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:10:17.277Z
Reserved: 2021-11-19T00:00:00
Link: CVE-2021-44044

No data.

Status : Modified
Published: 2021-12-05T21:15:07.950
Modified: 2024-11-21T06:30:17.127
Link: CVE-2021-44044

No data.