First published: Mon Jan 27 2020(Updated: )
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/exiv2 | <0.25-3.1ubuntu0.18.04.5 | 0.25-3.1ubuntu0.18.04.5 |
ubuntu/exiv2 | <0.25-4ubuntu2.2 | 0.25-4ubuntu2.2 |
ubuntu/exiv2 | <0.27.2-8 | 0.27.2-8 |
ubuntu/exiv2 | <0.25-2.1ubuntu16.04.6 | 0.25-2.1ubuntu16.04.6 |
debian/exiv2 | 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 0.28.3+dfsg-2 | |
Exiv2 | =0.27.2 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
Debian | =9.0 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20421 has a high severity rating as it can lead to a denial of service through high CPU consumption.
To fix CVE-2019-20421, update the Exiv2 package to a version that is not vulnerable, such as version 0.27.3-3+deb11u2 or later.
CVE-2019-20421 can be exploited by remote attackers using crafted input files that cause an infinite loop.
CVE-2019-20421 affects Exiv2 versions prior to 0.27.3 and various specific versions of the package on Ubuntu and Debian systems.
Yes, patches are available in newer releases of the Exiv2 software that address CVE-2019-20421.