Description
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
References (4)
Core 4
Core References
Third Party Advisory vendor-advisory
https://usn.ubuntu.com/4159-1/
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2019/12/msg00001.html
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
Issue Tracking, Third Party Advisory
https://github.com/Exiv2/exiv2/issues/1019
Scores
CVSS v3
6.5
EPSS
0.0026
EPSS Percentile
49.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (7)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.04
canonical/ubuntu_linux
19.10
debian/debian_linux
8.0
debian/debian_linux
10.0
exiv2/exiv2
0.27.2
Published
Oct 09, 2019
Tracked Since
Feb 18, 2026