First published: Tue Feb 18 2025(Updated: )
### Impact A heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are **not** affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fixiso`. ### Patches The bug is fixed in version v0.28.5. ### References Issue: https://github.com/Exiv2/exiv2/issues/3168 Fix: https://github.com/Exiv2/exiv2/pull/3174 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Exiv2 | >=0.28.0<0.28.5 | 0.28.5 |
CentOS Dos2unix | >=0.28.0<0.28.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26623 has been rated with a high severity due to the potential for a heap buffer overflow.
To fix CVE-2025-26623, upgrade Exiv2 to version 0.28.5 or later.
Exiv2 versions from 0.28.0 to 0.28.4 are affected by CVE-2025-26623.
No, Exiv2 version 0.27.7 is not affected by CVE-2025-26623.
CVE-2025-26623 involves a heap buffer overflow vulnerability.