// For flags

CVE-2019-13109

exiv2: denial of service in PngImage::readMetadata

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.

Un desbordamiento de enteros en Exiv2 hasta la versión 0.27.1, permite a un atacante causar una denegación de servicio (SIGSEGV) por medio de un archivo de imagen PNG creado, debido a que PngImage::readMetadata maneja de manera inapropiada una sustracción chunkLength - iccOffset.

An update that fixes 11 vulnerabilities is now available. This update for exiv2-0_26 fixes the following issues. Fixed improper validation of the total size to the offset and size leads to a crash in Exiv2::getULong in types.cpp. Fixed a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header. Fixed an excessive stack consumption CiffDirectory:readDirectory at crwimage_int.cpp. Infinite loop in Exiv2::Jp2Image::encodeJp2Header. Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu. Fixed a floating point exception in Exiv2::ValueType. Fixed a heap-based buffer overflow in getData in preview.cpp. Fixed a deny-of-service due to assertion failure in crwimage_int.cpp. Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata. Fixed a denial of service in PngImage:readMetadata. Fixed an integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denial of service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-06-30 CVE Reserved
  • 2019-06-30 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2025-07-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-190: Integer Overflow or Wraparound
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Exiv2
Search vendor "Exiv2"
Exiv2
Search vendor "Exiv2" for product "Exiv2"
<= 0.27.1
Search vendor "Exiv2" for product "Exiv2" and version " <= 0.27.1"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
30
Search vendor "Fedoraproject" for product "Fedora" and version "30"
-
Affected