Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p4gw-2vrq-j64q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

EPSS

Процентиль: 86%
0.03067
Низкий

Дефекты

CWE-835

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

CVSS3: 7.5
redhat
около 6 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

CVSS3: 7.5
nvd
почти 6 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

CVSS3: 7.5
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 7.5
debian
почти 6 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input ...

EPSS

Процентиль: 86%
0.03067
Низкий

Дефекты

CWE-835