First published: Mon Jun 25 2018(Updated: )
Exiv2 through version 0.26 is vulnerable to a segmentation fault in the pngimage.cpp:tEXtToDataBuf() function. An attacker could exploit this to cause a denial of service or via crafted file. Product Bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - There is a Segmentation fault in the software exiv2 when the function Exiv2::tEXtToDataBuf() is finished" href="show_bug.cgi?id=1566260">https://bugzilla.redhat.com/show_bug.cgi?id=1566260</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix | <=0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1594627 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1594627, update Exiv2 to a version higher than 0.26.
REDHAT-BUG-1594627 is a segmentation fault vulnerability found in the pngimage.cpp:tEXtToDataBuf() function.
Yes, an attacker can exploit REDHAT-BUG-1594627 remotely by using a crafted file.
Exiv2 versions up to and including 0.26 are affected by REDHAT-BUG-1594627.