First published: Mon Nov 12 2018(Updated: )
A flaw was found in Exiv2 0.26. A heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader). This could lead to a denial of service caused by an integer overflow via a crafted PSD image file. References: <a href="https://github.com/Exiv2/exiv2/issues/427">https://github.com/Exiv2/exiv2/issues/427</a> Upstream Patch: <a href="https://github.com/Exiv2/exiv2/pull/518">https://github.com/Exiv2/exiv2/pull/518</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1649094 is significant due to the potential for denial of service.
To fix REDHAT-BUG-1649094, update Exiv2 to the latest version that addresses this vulnerability.
The vulnerability REDHAT-BUG-1649094 is caused by a heap-based buffer over-read resulting from an integer overflow when processing crafted PSD image files.
The potential impacts of REDHAT-BUG-1649094 include application crashes and denial of service due to the exploitation of the vulnerability.
If you are using Exiv2 version 0.26 or earlier, your system may be affected by REDHAT-BUG-1649094.