First published: Sun Jul 23 2017(Updated: )
There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.2 | 0.25-3.1ubuntu0.18.04.2 |
ubuntu/exiv2 | <0.25-4ubuntu0.1 | 0.25-4ubuntu0.1 |
ubuntu/exiv2 | <0.23-1ubuntu2.2 | 0.23-1ubuntu2.2 |
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.3 | 0.25-2.1ubuntu16.04.3 |
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 | |
Exiv2 | =0.26 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11591 has been classified as a denial of service vulnerability.
To fix CVE-2017-11591, update to a version of Exiv2 that is newer than 0.26.
The affected version of Exiv2 in CVE-2017-11591 is 0.26.
Yes, CVE-2017-11591 can be exploited remotely through crafted input.
CVE-2017-11591 impacts Ubuntu and Debian systems using the vulnerable version of Exiv2.