First published: Mon Nov 26 2018(Updated: )
An issue was found in Exiv2 0.26 and previous versions. A heap-based buffer over-read in PngChunk::readRawProfile function in pngchunk_int.cpp may cause a denial of service via a crafted PNG file. References: <a href="https://github.com/Exiv2/exiv2/issues/428">https://github.com/Exiv2/exiv2/issues/428</a> <a href="https://github.com/Exiv2/exiv2/pull/430">https://github.com/Exiv2/exiv2/pull/430</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 0.28.3+dfsg-2 | |
Exiv2 Exiv2 | <=0.26 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =10.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Ubuntu Linux | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19535 has been identified as a potential denial of service vulnerability that can be triggered by a specially crafted PNG file.
To mitigate CVE-2018-19535, upgrade Exiv2 to version 0.27.3 or later.
Exiv2 versions up to and including 0.26 are affected by CVE-2018-19535.
CVE-2018-19535 affects Exiv2 running on Debian, Ubuntu, and Red Hat Enterprise Linux platforms.
CVE-2018-19535 does not allow for remote code execution but can lead to a denial of service condition.