First published: Wed Jun 13 2018(Updated: )
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp. References: <a href="https://github.com/Exiv2/exiv2/issues/365">https://github.com/Exiv2/exiv2/issues/365</a> <a href="https://github.com/TeamSeri0us/pocs/blob/master/exiv2/1-out-of-read-Poc">https://github.com/TeamSeri0us/pocs/blob/master/exiv2/1-out-of-read-Poc</a> Patch: <a href="https://github.com/Exiv2/exiv2/commit/341de4500ab993103c215bfb07d43d4a08654ac4">https://github.com/Exiv2/exiv2/commit/341de4500ab993103c215bfb07d43d4a08654ac4</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1590994 is considered critical due to its potential for leading to out-of-bounds reads.
To fix REDHAT-BUG-1590994, update Exiv2 to the latest version where the vulnerability has been patched.
Potential impacts of REDHAT-BUG-1590994 include application crashes and possible denial of service.
Exiv2 version 0.26 is specifically affected by the vulnerability detailed in REDHAT-BUG-1590994.
Yes, there are public proof of concepts available that demonstrate the exploitation of REDHAT-BUG-1590994.