In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::Image::byteSwap4 function in image.cpp. Remote attackers can exploit this vulnerability to disclose memory data or cause a denial of service via a crafted TIFF file.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1524104 | Exploit Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201811-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1524104 | Exploit Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201811-14 |
Configurations
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1524104 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201811-14 - |
Information
Published : 2018-02-12 22:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17723
Mitre link : CVE-2017-17723
CVE.ORG link : CVE-2017-17723
JSON object : View
Products Affected
exiv2
- exiv2
CWE
CWE-125
Out-of-bounds Read