First published: Mon Jul 26 2021(Updated: )
An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | 0.25-4+deb10u2 0.25-4+deb10u4 0.27.3-3+deb11u2 0.27.3-3+deb11u1 0.27.6-1 | |
Exiv2 Exiv2 | =0.27.3 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
redhat/exiv2 | <0.27.4 | 0.27.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-31292 is high with a CVSS score of 7.5.
Attackers can trigger a heap-based buffer overflow and cause a denial of service by exploiting the integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3.
Exiv2 versions 0.25-4+deb10u2, 0.25-4+deb10u4, 0.27.3-3+deb11u2, 0.27.3-3+deb11u1, and 0.27.6-1 are affected by CVE-2021-31292.
You can find more information about CVE-2021-31292 on the GitHub pages and the Debian security tracker provided in the references.