Vulnerability Description
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exiv2 | Exiv2 | 0.26 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2019:2101
- https://bugzilla.redhat.com/show_bug.cgi?id=1524107ExploitIssue TrackingThird Party Advisory
- https://github.com/Exiv2/exiv2/issues/263
- https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md
- https://security.gentoo.org/glsa/201811-14
- https://access.redhat.com/errata/RHSA-2019:2101
- https://bugzilla.redhat.com/show_bug.cgi?id=1524107ExploitIssue TrackingThird Party Advisory
- https://github.com/Exiv2/exiv2/issues/263
- https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md
- https://security.gentoo.org/glsa/201811-14
FAQ
What is CVE-2017-17724?
CVE-2017-17724 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cau...
How severe is CVE-2017-17724?
CVE-2017-17724 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17724?
Check the references section above for vendor advisories and patch information. Affected products include: Exiv2 Exiv2.