First published: Mon Feb 12 2018(Updated: )
A flaw was found in Exiv2 0.26. There is a integer underflow, leading to a heap-based buffer over-read, in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file or, possibly, disclose memory data. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - exiv2 library: heap-based buffer over-read in Exiv2::IptcData::printStructure (iptc.cpp)" href="show_bug.cgi?id=1524107">https://bugzilla.redhat.com/show_bug.cgi?id=1524107</a> <a href="https://github.com/Exiv2/exiv2/issues/210">https://github.com/Exiv2/exiv2/issues/210</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exiv2 Exiv2 | =0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.