An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.
References
Link | Resource |
---|---|
http://dev.exiv2.org/issues/1295 | Issue Tracking |
http://www.securityfocus.com/bid/98720 | Third Party Advisory VDB Entry |
https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test(exiv2) | Exploit Third Party Advisory |
https://usn.ubuntu.com/3852-1/ | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-05-26 03:29
Updated : 2020-04-08 17:15
NVD link : CVE-2017-9239
Mitre link : CVE-2017-9239
JSON object : View
CWE
CWE-369
Divide By Zero
Products Affected
canonical
- ubuntu_linux
exiv2
- exiv2