CVE-2018-9305
exiv2: out of bounds read in IptcData::printStructure in iptc.c
Severity Score
8.1
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
In Exiv2 0.26, an out-of-bounds read in IptcData::printStructure in iptc.c could result in a crash or information leak, related to the "== 0x1c" case.
En Exiv2 0.26, una lectura fuera de límites en IptcData::printStructure en iptc.c podría resultar en un cierre inesperado o una fuga de información. Esto está relacionado con el caso "== 0x1c".
An out-of-bounds read vulnerability has been discovered in IptcData::printStructure in iptc.cpp file of Exiv2 0.26. An attacker could cause a crash or an information leak by providing a crafted image.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-04-04 CVE Reserved
- 2018-04-04 CVE Published
- 2023-08-26 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (7)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Exiv2/exiv2/issues/263 | 2024-08-05 | |
https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html | 2019-08-06 | |
https://access.redhat.com/errata/RHSA-2019:2101 | 2019-08-06 | |
https://security.gentoo.org/glsa/201811-14 | 2019-08-06 | |
https://access.redhat.com/security/cve/CVE-2018-9305 | 2020-04-28 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1566735 | 2020-04-28 |