ALT-PU-2020-2260-1
Closed vulnerabilities
BDU:2020-05759
Уязвимость модуля crwimage_int.cpp библиотеки Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01492
Уязвимость функции Jp2Image::readMetadata() файла jp2image.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01655
Уязвимость компонента mrwimage.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13504
There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
- 109117
- 109117
- https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/
- https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/
- https://github.com/Exiv2/exiv2/pull/943
- https://github.com/Exiv2/exiv2/pull/943
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1855-1] exiv2 security update
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1855-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
Modified: 2024-11-21
CVE-2019-17402
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
- https://github.com/Exiv2/exiv2/issues/1019
- https://github.com/Exiv2/exiv2/issues/1019
- [debian-lts-announce] 20191202 [SECURITY] [DLA 2019-1] exiv2 security update
- [debian-lts-announce] 20191202 [SECURITY] [DLA 2019-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- USN-4159-1
- USN-4159-1
Modified: 2024-11-21
CVE-2019-20421
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
- https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
- https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
- https://github.com/Exiv2/exiv2/issues/1011
- https://github.com/Exiv2/exiv2/issues/1011
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- USN-4270-1
- USN-4270-1
- DSA-4958
- DSA-4958