CVE-2021-32617
Denial of service in Exiv2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`.
Exiv2 es una utilidad de línea de comandos y una biblioteca C++ para leer, escribir, eliminar y modificar los metadatos de archivos de imagen. Fue encontrado un algoritmo ineficiente (complejidad cuadrática) en Exiv2 versiones v0.27.3 y anteriores. El algoritmo ineficiente es desencadenado cuando Exiv2 es usado para escribir metadatos en un archivo de imagen diseñado. Un atacante podría explotar la vulnerabilidad para causar una denegación de servicio, si pueden engañar a la víctima para que ejecute Exiv2 en un archivo de imagen diseñado. El bug es corregido en versión v0.27.4. Tome en cuenta que este bug solo es desencadenado al _escribir_ los metadatos, que es una operación Exiv2 que es usado con menos frecuencia que _leer_ los metadatos. Por ejemplo, para desencadenar el bug en la aplicación de línea de comandos de Exiv2, necesitas agregar un argumento de línea de comandos adicional como "rm"
There's a flaw in the xmpsdk component shipped with exiv2. An attacker who is able to submit a crafted file to be processed by an application linked with the exiv2 library could cause an excessive consumption of resources, potentially leading to denial of service. The greatest impact of this flaw is to system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-12 CVE Reserved
- 2021-05-17 CVE Published
- 2024-01-31 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (9)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Exiv2/exiv2/pull/1657 | 2023-12-22 | |
https://github.com/Exiv2/exiv2/security/advisories/GHSA-w8mv-g8qq-36mj | 2023-12-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Exiv2 Search vendor "Exiv2" | Exiv2 Search vendor "Exiv2" for product "Exiv2" | < 0.27.4 Search vendor "Exiv2" for product "Exiv2" and version " < 0.27.4" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
|