Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p4gw-2vrq-j64q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

EPSS

Процентиль: 84%
0.0242
Низкий

Дефекты

CWE-835

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

CVSS3: 7.5
redhat
почти 6 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

CVSS3: 7.5
nvd
больше 5 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

CVSS3: 7.5
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 5 лет назад

In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input ...

EPSS

Процентиль: 84%
0.0242
Низкий

Дефекты

CWE-835