First published: Mon Feb 12 2018(Updated: )
In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exiv2 Exiv2 | =0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-17725 is classified as a medium risk due to potential denial of service attacks.
To fix CVE-2017-17725, upgrade Exiv2 to version 0.27 or later, which addresses this vulnerability.
CVE-2017-17725 affects users running Exiv2 version 0.26.
CVE-2017-17725 can enable remote attackers to perform denial of service attacks via crafted image files.
CVE-2017-17725 is an integer overflow leading to a heap-based buffer over-read in the Exiv2 library.