First published: Wed Jun 13 2018(Updated: )
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 0.28.3+dfsg-2 | |
Exiv2 Exiv2 | =0.26 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Ubuntu Linux | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12265 has a medium severity rating due to its potential to lead to out-of-bounds read vulnerabilities.
To fix CVE-2018-12265, upgrade Exiv2 to version 0.27.3 or later.
CVE-2018-12265 affects Exiv2 version 0.26 and earlier on Debian and various versions of Ubuntu.
Exploitation of CVE-2018-12265 could lead to application crashes or potentially allow attackers to read sensitive information.
Yes, CVE-2018-12265 is present in major Linux distributions such as Debian and Ubuntu, especially in Exiv2 version 0.26.