First published: Mon Feb 12 2018(Updated: )
A flaw was found in Exiv2 0.26. There is a integer underflow, leading to a heap-based buffer over-read, in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file or, possibly, disclose memory data. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - exiv2 library: heap-based buffer over-read in Exiv2::IptcData::printStructure (iptc.cpp)" href="show_bug.cgi?id=1524107">https://bugzilla.redhat.com/show_bug.cgi?id=1524107</a> <a href="https://github.com/Exiv2/exiv2/issues/210">https://github.com/Exiv2/exiv2/issues/210</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exiv2 Exiv2 | =0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17724 has a medium severity rating due to its potential to cause denial of service and possible memory data disclosure.
To fix CVE-2017-17724, update Exiv2 to version 0.26 or later.
CVE-2017-17724 facilitates a denial of service attack through crafted TIFF files.
CVE-2017-17724 affects Exiv2 version 0.26.
Yes, CVE-2017-17724 may potentially disclose sensitive memory data to attackers.