logo

CVE-2023-44398 exiv2

Package

Manager: pip
Name: exiv2
Vulnerable Version: =0.1 || =0.11.0 || =0.11.1 || =0.11.2 || =0.11.3 || =0.12.0 || =0.12.1 || =0.13.0 || =0.13.1 || =0.13.2 || =0.14.0 || =0.14.1 || =0.2 || =0.3 || =0.3.1 || =0.15.0 || =0.16.0 || =0.16.1 || >=0 <e884a0955359107f4031c74a07406df7e99929a5

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00473 pctl0.63729

Details

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Metadata

Created: 2023-11-06T18:15:00Z
Modified: 2024-01-02T15:20:59.435740Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F316
Auto approve: 1