Description
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
References (5)
Core 5
Core References
Various Sources x_refsource_misc
https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201811-14
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1524107
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2101
Issue Tracking x_refsource_misc
https://github.com/Exiv2/exiv2/issues/263
Scores
CVSS v3
6.5
EPSS
0.0045
EPSS Percentile
63.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (1)
exiv2/exiv2
0.26
Published
Feb 12, 2018
Tracked Since
Feb 18, 2026