CVE-2017-17724

NameCVE-2017-17724
DescriptionIn Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
exiv2 (PTS)stretch0.25-3.1+deb9u2fixed
stretch (security)0.25-3.1+deb9u1fixed
buster0.25-4+deb10u1fixed
bullseye, sid0.27.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
exiv2source(unstable)(not affected)

Notes

- exiv2 <not-affected> (Introduced in 0.26; only affected experimental; bug #891783)
https://bugzilla.redhat.com/show_bug.cgi?id=1524107
https://github.com/Exiv2/exiv2/issues/210
https://github.com/Exiv2/exiv2/commit/962962a8e9885ccbca28f624492f1427152a0695

Search for package or bug name: Reporting problems