Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f74q-rm7p-mwq5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A heap-based buffer overflow vulnerability in jp2image.cpp of Exiv2 0.27.3 allows attackers to cause a denial of service (DOS) via crafted metadata.

A heap-based buffer overflow vulnerability in jp2image.cpp of Exiv2 0.27.3 allows attackers to cause a denial of service (DOS) via crafted metadata.

Дефекты

CWE-787

Связанные уязвимости

ubuntu
около 4 лет назад

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

CVSS3: 8.1
redhat
около 4 лет назад

A flaw was found in exiv2. A flawed bounds checking in the jp2Image.cpp:doWriteMetadata function leads to a heap-based buffer overflow. This flaw allows an attacker who can provide a malicious image to an application using the exiv2 library, to write data out of bounds and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

nvd
около 4 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

rocky
почти 4 года назад

Important: exiv2 security update

oracle-oval
почти 4 года назад

ELSA-2021-3234: compat-exiv2-023 security update (IMPORTANT)

Дефекты

CWE-787