First published: Fri Jul 27 2018(Updated: )
A flaw was found in Exiv2 0.26. The samples/geotag.cpp in the example code misuses the realpath function on POSIX platforms (other than Apple platforms) where glibc is not used, possibly leading to a buffer overflow. References: <a href="https://github.com/Exiv2/exiv2/issues/382">https://github.com/Exiv2/exiv2/issues/382</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1609396 is classified as high due to the potential for buffer overflow vulnerabilities.
To fix REDHAT-BUG-1609396, ensure you update to the latest version of Exiv2 that addresses this vulnerability.
REDHAT-BUG-1609396 affects Exiv2 versions prior to the patched updates on POSIX platforms excluding Apple platforms.
Yes, if unpatched, REDHAT-BUG-1609396 can be exploited by attackers to cause a buffer overflow.
The cause of REDHAT-BUG-1609396 is a misuse of the realpath function in the samples/geotag.cpp file in Exiv2.