vulnerability
Oracle Linux: CVE-2017-17724: ELSA-2019-2101: exiv2 security, bug fix, and enhancement update (LOW) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:L/Au:N/C:P/I:N/A:P) | 2017-12-10 | 2020-07-21 | 2024-11-27 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:P)
Published
2017-12-10
Added
2020-07-21
Modified
2024-11-27
Description
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
An integer underflow, leading to heap-based out-of-bound read, was found in the way Exiv2 library prints IPTC Photo Metadata embedded in an image. By persuading a victim to open a crafted image, a remote attacker could crash the application or possibly retrieve a portion of memory.
An integer underflow, leading to heap-based out-of-bound read, was found in the way Exiv2 library prints IPTC Photo Metadata embedded in an image. By persuading a victim to open a crafted image, a remote attacker could crash the application or possibly retrieve a portion of memory.
Solution(s)
oracle-linux-upgrade-exiv2oracle-linux-upgrade-exiv2-develoracle-linux-upgrade-exiv2-docoracle-linux-upgrade-exiv2-libs

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.