First published: Thu Apr 12 2018(Updated: )
A flaw was found in Exiv2 0.26, a divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp could result in denial of service. References: <a href="https://github.com/Exiv2/exiv2/issues/262">https://github.com/Exiv2/exiv2/issues/262</a> <a href="https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md">https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The impact of REDHAT-BUG-1566731 is a potential denial of service due to a divide by zero error in Exiv2 0.26.
Exiv2 version 0.26 is affected by the vulnerability identified as REDHAT-BUG-1566731.
To mitigate REDHAT-BUG-1566731, it is recommended to upgrade to a fixed version of Exiv2 that addresses this vulnerability.
Yes, patches for REDHAT-BUG-1566731 are typically included in newer releases of Exiv2.
While REDHAT-BUG-1566731 may lead to denial of service, the specifics of remote exploitation depend on the context in which Exiv2 is used.