First published: Wed Feb 14 2018(Updated: )
A flaw was found in Exiv2 0.26. There is a integer underflow, leading to a heap-based buffer over-read, in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file or, possibly, disclose memory data. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - exiv2 library: heap-based buffer over-read in Exiv2::IptcData::printStructure (iptc.cpp)" href="show_bug.cgi?id=1524107">https://bugzilla.redhat.com/show_bug.cgi?id=1524107</a> <a href="https://github.com/Exiv2/exiv2/issues/210">https://github.com/Exiv2/exiv2/issues/210</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1545237 is considered high due to its potential to cause denial of service and possible memory data disclosure.
To fix REDHAT-BUG-1545237, it's recommended to update Exiv2 to the latest version where this vulnerability has been addressed.
REDHAT-BUG-1545237 affects users of Exiv2 version 0.26 and potentially vulnerable applications relying on this library.
Attackers can exploit REDHAT-BUG-1545237 by crafting malicious TIFF files leading to a denial of service or memory data exposure.
The vulnerable component in REDHAT-BUG-1545237 is the Exiv2::IptcData::printStructure function in iptc.cpp.