CVE-2017-17725

In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1525055 Exploit Issue Tracking Third Party Advisory
https://github.com/Exiv2/exiv2/issues/188 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1525055 Exploit Issue Tracking Third Party Advisory
https://github.com/Exiv2/exiv2/issues/188 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1525055 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1525055 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/Exiv2/exiv2/issues/188 - Exploit, Issue Tracking () https://github.com/Exiv2/exiv2/issues/188 - Exploit, Issue Tracking

Information

Published : 2018-02-12 22:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17725

Mitre link : CVE-2017-17725

CVE.ORG link : CVE-2017-17725


JSON object : View

Products Affected

exiv2

  • exiv2
CWE
CWE-190

Integer Overflow or Wraparound