Buffer over-read in Exiv2 - CVE-2017-17724
Published: March 14, 2018 / Updated: March 7, 2019
Vulnerability identifier: #VU11070
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-17724
CWE-ID: CWE-126
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: GNU
Affected software:
Exiv2
Exiv2
Detailed vulnerability description
The vulnerability allows an remote unauthenticated attacker to cause DoS on the target system.
The weakness exists in the Exiv2::IptcData::printStructure function due to insufficient validation of user-supplied input. A remote attacker can submit a specially crafted TIFF file, trigger heap-based buffer over-read and cause the service to crash.
The weakness exists in the Exiv2::IptcData::printStructure function due to insufficient validation of user-supplied input. A remote attacker can submit a specially crafted TIFF file, trigger heap-based buffer over-read and cause the service to crash.
How to mitigate CVE-2017-17724
Install update from vendor's website.