First published: Thu Jul 27 2017(Updated: )
There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp of Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.2 | 0.25-3.1ubuntu0.18.04.2 |
ubuntu/exiv2 | <0.25-4ubuntu0.1 | 0.25-4ubuntu0.1 |
ubuntu/exiv2 | <0.23-1ubuntu2.2 | 0.23-1ubuntu2.2 |
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.3 | 0.25-2.1ubuntu16.04.3 |
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 | |
Exiv2 | =0.26 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11683 has a high severity rating due to its potential for remote denial of service attacks.
To fix CVE-2017-11683, upgrade to Exiv2 versions 0.27.3-3+deb11u2 or newer, depending on your operating system.
Exiv2 version 0.26 is affected by CVE-2017-11683, along with various previous versions listed for Ubuntu and Debian.
Yes, CVE-2017-11683 can be exploited remotely through specially crafted input that triggers the vulnerability.
CVE-2017-11683 enables a remote denial of service attack, potentially crashing applications that utilize the Exiv2 library.