First published: Wed Oct 09 2019(Updated: )
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.4 | 0.25-3.1ubuntu0.18.04.4 |
ubuntu/exiv2 | <0.25-4ubuntu1.2 | 0.25-4ubuntu1.2 |
ubuntu/exiv2 | <0.25-4ubuntu2.1 | 0.25-4ubuntu2.1 |
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.5 | 0.25-2.1ubuntu16.04.5 |
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 | |
Exiv2 | =0.27.2 | |
Debian | =8.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
Ubuntu | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17402 is classified as a high severity vulnerability due to its potential to cause application crashes.
To fix CVE-2019-17402, upgrade Exiv2 to version 0.27.3 or later for Debian or use the specified patched versions for Ubuntu as indicated in the affected software details.
Exiv2 version 0.27.2 is the affected version for CVE-2019-17402.
CVE-2019-17402 can be exploited through maliciously crafted images, potentially affecting systems running vulnerable versions.
The impact of CVE-2019-17402 can lead to application crashes resulting in loss of service for applications using Exiv2.