Описание
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | code not present |
bionic | not-affected | code not present |
devel | not-affected | code not present |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [code not present]] |
esm-infra/bionic | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
precise/esm | DNE | |
trusty | not-affected | code not present |
trusty/esm | DNE | trusty was not-affected [code not present] |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
4.3 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::Ip ...
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
ELSA-2019-2101: exiv2 security, bug fix, and enhancement update (LOW)
EPSS
4.3 Medium
CVSS2
6.5 Medium
CVSS3