First published: Fri Sep 28 2018(Updated: )
A flaw was found in Exiv2 0.26. The CiffDirectory::readDirectory() function at crwimage_int.cpp has an excessive stack consumption due to a recursive function, leading to Denial of service. References: <a href="https://github.com/Exiv2/exiv2/issues/460">https://github.com/Exiv2/exiv2/issues/460</a> <a href="https://github.com/SegfaultMasters/covering360/blob/master/Exiv2">https://github.com/SegfaultMasters/covering360/blob/master/Exiv2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.2 | 0.25-3.1ubuntu0.18.04.2 |
ubuntu/exiv2 | <0.25-4ubuntu0.1 | 0.25-4ubuntu0.1 |
ubuntu/exiv2 | <0.23-1ubuntu2.2 | 0.23-1ubuntu2.2 |
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.3 | 0.25-2.1ubuntu16.04.3 |
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 | |
Exiv2 | =0.26 | |
Exiv2 | =0.27 | |
Debian | =8.0 | |
Debian | =10.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17581 has been classified as a Denial of Service vulnerability due to excessive stack consumption.
To fix CVE-2018-17581, update to Exiv2 version 0.27 or later, or the specific patched versions indicated for your distribution.
CVE-2018-17581 affects Exiv2 versions prior to 0.27, specifically 0.26 and 0.25 on various distributions.
CVE-2018-17581 impacts various operating systems that use affected versions of Exiv2, including Ubuntu and Debian.
CVE-2018-17581 can potentially be exploited remotely as it leads to a Denial of Service condition.