First published: Sat Sep 01 2018(Updated: )
Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.2 | 0.25-3.1ubuntu0.18.04.2 |
ubuntu/exiv2 | <0.25-4ubuntu0.1 | 0.25-4ubuntu0.1 |
ubuntu/exiv2 | <0.23-1ubuntu2.2 | 0.23-1ubuntu2.2 |
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.3 | 0.25-2.1ubuntu16.04.3 |
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 | |
Exiv2 Exiv2 | =0.26 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16336 in Exiv2 v0.26 allows remote attackers to cause a denial of service due to a heap-based buffer over-read by using a crafted image file.
Exiv2 v0.26 and specific Ubuntu and Debian versions are affected by CVE-2018-16336, including Ubuntu 18.04, 18.10, and various Debian releases.
To fix CVE-2018-16336, update Exiv2 to a version greater than 0.26, specifically the patched versions provided by your Linux distribution.
CVE-2018-16336 impacts various Linux distributions, specifically versions of Exiv2 used in Ubuntu and Debian.
CVE-2018-16336 is classified as a denial of service vulnerability, which can disrupt service availability but may not necessarily allow for unauthorized access.