Description
Buffer overflow in Andreas Huggel Exiv2 before 0.9 does not null terminate strings before calling the sscanf function, which allows remote attackers to cause a denial of service (application crash) via images with crafted IPTC metadata.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Maciek Wierciski · textdosmultiple
https://www.exploit-db.com/exploits/27140
References (6)
Core 6
Core References
Various Sources x_refsource_confirm
http://home.arcor.de/ahuggel/exiv2/changelog.html
Various Sources x_refsource_misc
http://dev.robotbattle.com/mantis/bug_view_advanced_page.php?bug_id=447
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0345
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18619
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24349
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16400
Scores
EPSS
0.1284
EPSS Percentile
94.1%
Details
Status
published
Products (8)
andreas_huggel/exiv2
0.3
andreas_huggel/exiv2
0.4
andreas_huggel/exiv2
0.5
andreas_huggel/exiv2
0.6
andreas_huggel/exiv2
0.6.1
andreas_huggel/exiv2
0.6.2
andreas_huggel/exiv2
0.7
andreas_huggel/exiv2
0.8
Published
Dec 31, 2005
Tracked Since
Feb 18, 2026