First published: Mon Jul 08 2024(Updated: )
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 version v0.28.2. The vulnerability is in the parser for the ASF video format, which was a new feature in v0.28.0. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted video file. The bug is fixed in version v0.28.3.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix | >=0.28.0<0.28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39695 has been assessed as having a moderate severity due to the potential for out-of-bounds reads.
To fix CVE-2024-39695, upgrade Exiv2 to version 0.28.3 or later.
CVE-2024-39695 affects Exiv2 versions from 0.28.0 to 0.28.2.
The vulnerability in CVE-2024-39695 is an out-of-bounds read occurring in the ASF video format parser.
There are no known effective workarounds for CVE-2024-39695, so upgrading is the recommended action.