CVE-2017-17724

In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2019:2101 - () https://access.redhat.com/errata/RHSA-2019:2101 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1524107 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1524107 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/Exiv2/exiv2/issues/263 - () https://github.com/Exiv2/exiv2/issues/263 -
References () https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md - () https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md -
References () https://security.gentoo.org/glsa/201811-14 - () https://security.gentoo.org/glsa/201811-14 -

Information

Published : 2018-02-12 22:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17724

Mitre link : CVE-2017-17724

CVE.ORG link : CVE-2017-17724


JSON object : View

Products Affected

exiv2

  • exiv2
CWE
CWE-125

Out-of-bounds Read