CVE-2021-37620
Out-of-bounds read in XmpTextValue::read()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
Exiv2 es una utilidad de línea de comandos y una biblioteca C++ para leer, escribir, borrar y modificar los metadatos de los archivos de imagen. En versiones v0.27.4 y anteriores a Exiv2 se encontró una lectura fuera de límites. La lectura fuera de límites es desencadenada cuando Exiv2 es usado para leer los metadatos de un archivo de imagen diseñado. Un atacante podría explotar potencialmente la vulnerabilidad para causar una denegación de servicio, si puede engañar a la víctima para que ejecute Exiv2 en un archivo de imagen diseñado. El bug es corregido en versión v0.27.5
An update that solves 15 vulnerabilities, contains one feature and has one errata is now available. This update for exiv2 fixes the following issues. Updated to version 0.27.5. Fixed stack out of bounds read in JPEG2000 parser. Fixed integer overflow PngImage:readMetadata. Fixed buffer overflow vulnerability in the Databuf function in types.cpp. Fixed heap buffer overflow when write metadata into a crafted image file. Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header. Fixed read of uninitialized memory. Fixed heap-based buffer overflow in jp2image.cpp. Fixed denial of service due to inefficient algorithm. Fixed out-of-bounds read in XmpTextValue:read. Fixed DoS due to infinite loop in Image:printIFDStructure. Fixed DoS due to infinite loop in JpegBase:printStructure. Fixed DoS due to integer overflow in loop counter. Fixed DoS due to infinite loop in JpegBase:printStructure. Fixed out-of-bounds read in webpimage.cpp. Fixed DoS due to integer overflow in loop counter. Fixed integer overflow in WebPImage:decodeChunks that lead to denial of service. Fixed an out-of-bounds read was found in webpimage.cpp Bugfixes. A new libexiv2-2_27 shared library is shipped, the libexiv2-2_26 is provided only for compatibility now. Please recompile your applications using the exiv2 library.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-07-29 CVE Reserved
- 2021-08-09 CVE Published
- 2024-08-04 CVE Updated
- 2025-07-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Exiv2/exiv2/pull/1769 | 2023-12-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Exiv2 Search vendor "Exiv2" | Exiv2 Search vendor "Exiv2" for product "Exiv2" | < 0.27.5 Search vendor "Exiv2" for product "Exiv2" and version " < 0.27.5" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|