First published: Mon Sep 24 2018(Updated: )
A flaw was found in Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file. References: <a href="https://github.com/Exiv2/exiv2/issues/455">https://github.com/Exiv2/exiv2/issues/455</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1632484 is critical due to the potential for a remote denial of service through a heap-based buffer overflow.
To fix REDHAT-BUG-1632484, upgrade Exiv2 to the latest version that contains the security patch.
The vulnerability REDHAT-BUG-1632484 is caused by a flaw in the Exiv2::ul2Data function that can be exploited via a crafted image file.
Users and applications utilizing Exiv2 v0.26 are affected by REDHAT-BUG-1632484.
Yes, the researchers have indicated that a proof of concept exists demonstrating the denial of service vulnerability in REDHAT-BUG-1632484.