First published: Tue Dec 18 2018(Updated: )
There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a denial of service attack. Upstream issue: <a href="https://github.com/Exiv2/exiv2/issues/590">https://github.com/Exiv2/exiv2/issues/590</a> References: <a href="https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206">https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1660426 is classified as a denial of service due to an infinite loop.
REDHAT-BUG-1660426 allows attackers to create crafted input that can lead to an infinite loop, causing application crashes.
Updating to a patched version of Exiv2 that addresses the infinite loop vulnerability will remedy REDHAT-BUG-1660426.
Exiv2 version 0.27-RC3 is specifically identified as being vulnerable in REDHAT-BUG-1660426.
Yes, REDHAT-BUG-1660426 can potentially be exploited remotely if an attacker can provide the crafted input.