In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2101 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1524107 | Exploit Issue Tracking Third Party Advisory |
https://github.com/Exiv2/exiv2/issues/263 | |
https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md | |
https://security.gentoo.org/glsa/201811-14 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-12T22:00:00
Updated: 2019-08-06T16:06:15
Reserved: 2017-12-17T00:00:00
Link: CVE-2017-17724
JSON object: View
NVD Information
Status : Modified
Published: 2018-02-12T22:29:00.320
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-17724
JSON object: View
Redhat Information
No data.
CWE