An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.
References
Link | Resource |
---|---|
http://dev.exiv2.org/issues/1295 | Issue Tracking |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html | |
http://www.securityfocus.com/bid/98720 | Third Party Advisory VDB Entry |
https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test%28exiv2%29 | |
https://usn.ubuntu.com/3852-1/ | Third Party Advisory |
http://dev.exiv2.org/issues/1295 | Issue Tracking |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html | |
http://www.securityfocus.com/bid/98720 | Third Party Advisory VDB Entry |
https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test%28exiv2%29 | |
https://usn.ubuntu.com/3852-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.exiv2.org/issues/1295 - Issue Tracking | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html - | |
References | () http://www.securityfocus.com/bid/98720 - Third Party Advisory, VDB Entry | |
References | () https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test%28exiv2%29 - | |
References | () https://usn.ubuntu.com/3852-1/ - Third Party Advisory |
07 Nov 2023, 02:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-05-26 10:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9239
Mitre link : CVE-2017-9239
CVE.ORG link : CVE-2017-9239
JSON object : View
Products Affected
canonical
- ubuntu_linux
exiv2
- exiv2
CWE
CWE-369
Divide By Zero