Vulnerability Description
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exiv2 | Exiv2 | < 0.27.4 |
| Fedoraproject | Fedora | 33 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://github.com/Exiv2/exiv2/issues/1529ExploitPatchThird Party Advisory
- https://github.com/Exiv2/exiv2/pull/1534PatchThird Party Advisory
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqmThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/08/msg00028.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202312-06
- https://www.debian.org/security/2021/dsa-4958Third Party Advisory
- https://github.com/Exiv2/exiv2/issues/1529ExploitPatchThird Party Advisory
- https://github.com/Exiv2/exiv2/pull/1534PatchThird Party Advisory
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqmThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/08/msg00028.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202312-06
FAQ
What is CVE-2021-29457?
CVE-2021-29457 is a vulnerability with a CVSS score of 7.8 (HIGH). Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The h...
How severe is CVE-2021-29457?
CVE-2021-29457 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29457?
Check the references section above for vendor advisories and patch information. Affected products include: Exiv2 Exiv2, Fedoraproject Fedora, Debian Debian Linux.