#VU28797 Buffer overflow in Exiv2


| Updated: 2020-06-30

Vulnerability identifier: #VU28797

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17402

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Exiv2
Universal components / Libraries / Libraries used by multiple products

Vendor: GNU

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary in Exiv2::getULong() function in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp. A remote attacker can pass specially crafted data to the application, trigger memory corruption and crash the service.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Exiv2: 0.16 - 0.27.2


External links
http://github.com/Exiv2/exiv2/issues/1019
http://lists.debian.org/debian-lts-announce/2019/12/msg00001.html
http://usn.ubuntu.com/4159-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability