First published: Wed Jun 13 2018(Updated: )
A flaw was found in Exiv2 0.26. An integer overflow in LoaderTiff::getData() in preview.cpp, leading to an out-of-bounds read in Exiv2::ValueType::setDataArea in value.hpp. References: <a href="https://github.com/Exiv2/exiv2/issues/366">https://github.com/Exiv2/exiv2/issues/366</a> <a href="https://github.com/TeamSeri0us/pocs/blob/master/exiv2/2-out-of-read-Poc">https://github.com/TeamSeri0us/pocs/blob/master/exiv2/2-out-of-read-Poc</a> Patch: <a href="https://github.com/Exiv2/exiv2/commit/341de4500ab993103c215bfb07d43d4a08654ac4">https://github.com/Exiv2/exiv2/commit/341de4500ab993103c215bfb07d43d4a08654ac4</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 0.28.3+dfsg-2 | |
Exiv2 | =0.26 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12264 is considered to have a high severity due to its potential for leading to an out-of-bounds read that can be exploited for denial of service or arbitrary code execution.
To fix CVE-2018-12264, users should upgrade Exiv2 to version 0.27.3-3+deb11u2 or later.
CVE-2018-12264 affects Exiv2 version 0.26 and all prior versions.
CVE-2018-12264 impacts platforms running Exiv2 0.26, particularly Debian and Ubuntu distributions.
As of now, there are no confirmed reports indicating active exploitation of CVE-2018-12264, but it remains a potential risk.