OGRECave / ogre

scene-oriented, flexible 3D engine (C++, Python, C#, Java)
https://ogrecave.github.io/ogre/
MIT License
3.85k stars 959 forks source link

FreeImage arbitrary code execution vulnerability #3069

Open lavenderdotpet opened 4 months ago

lavenderdotpet commented 4 months ago

main 2 I think is the most important to point out

both of these can run arbitrary code one of them being from the BMP plugin so I am assuming a person could get a user to load a malicious BMP or a file with a malicious bpm inside of it

Free Image should either be forked and fixed asap or abandoned for a different library

active project i could find that use freeimage https://github.com/sirjuddington/SLADE https://github.com/TrenchBroom/TrenchBroom https://github.com/RetroPie/EmulationStation https://github.com/MonoGame/MonoGame https://github.com/meganz/MEGAsync https://github.com/OGRECave/ogre https://github.com/OGRECave/ogre-next https://github.com/Open-Cascade-SAS/OCCT https://github.com/arrayfire/forge https://git.sr.ht/~exec64/imv https://github.com/arrayfire/arrayfire

Free Image v3.18.0

Free Image before v1.18.0

paroj commented 4 months ago

Thank you for addressing this issue. However, we would like to point out that the binaries we distribute utilize a Rust-based image loader instead of FreeImage. It is the responsibility of downstream users to address such issues. For example, Linux distributions often patch FreeImage, and some users have already transitioned to: https://github.com/agruzdev/FreeImageRe

lavenderdotpet commented 4 months ago

https://github.com/agruzdev/FreeImageRe

thank u so much for linking this