First published: Mon Apr 05 2021(Updated: )
A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/exiv2 | <=0.27.3-3+deb11u1 | 0.25-4+deb10u2 0.25-4+deb10u4 0.27.3-3+deb11u2 0.27.6-1 |
redhat/exiv2 | <0.27.4 | 0.27.4 |
CentOS Dos2unix | <=0.27.3 | |
CentOS Dos2unix | =0.27.4-rc1 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =33 | |
Fedora | =34 | |
Debian | =9.0 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3482 is considered a high-severity vulnerability due to its potential for heap-based buffer overflow attacks.
To fix CVE-2021-3482, update Exiv2 to version 0.27.4 or later, or apply patches provided by your operating system vendor.
CVE-2021-3482 affects Exiv2 versions prior to 0.27.4-RC1 across multiple Linux distributions including Debian and Red Hat.
CVE-2021-3482 exploits improper input validation leading to buffer overflow vulnerabilities in handling crafted JPG images.
Yes, CVE-2021-3482 can lead to remote code execution under certain conditions due to the buffer overflow.