CVE-2017-17724

NameCVE-2017-17724
DescriptionIn Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
exiv2 (PTS)buster0.25-4+deb10u2fixed
buster (security)0.25-4+deb10u4fixed
bullseye0.27.3-3+deb11u2fixed
bullseye (security)0.27.3-3+deb11u1fixed
sid, trixie, bookworm0.27.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
exiv2source(unstable)(not affected)

Notes

- exiv2 <not-affected> (Introduced in 0.26; only affected experimental; bug #891783)
https://bugzilla.redhat.com/show_bug.cgi?id=1524107
https://github.com/Exiv2/exiv2/issues/210
https://github.com/Exiv2/exiv2/commit/962962a8e9885ccbca28f624492f1427152a0695

Search for package or bug name: Reporting problems