Description
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
References (5)
Core 5
Core References
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/Exiv2/exiv2/issues/1011
Patch, Third Party Advisory x_refsource_misc
https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4270-1/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2021/dsa-4958
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html
Scores
CVSS v3
7.5
EPSS
0.0307
EPSS Percentile
86.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (6)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.10
debian/debian_linux
9.0
debian/debian_linux
10.0
exiv2/exiv2
0.27.2
Published
Jan 27, 2020
Tracked Since
Feb 18, 2026