CVE-2022-24614 – com.drewnoakes:metadata-extractor
Package
Manager: maven
Name: com.drewnoakes:metadata-extractor
Vulnerable Version: >=0 <2.18.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00278 pctl0.5085
Details
Allocation of Resources Without Limits or Throttling in metadata-extractor When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.
Metadata
Created: 2022-02-25T00:01:05Z
Modified: 2024-11-18T16:26:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-4v6p-cxf9-98rf/GHSA-4v6p-cxf9-98rf.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-4v6p-cxf9-98rf
Finding: F067
Auto approve: 1