7.5
CVSSv3

CVE-2021-31292

Published: 26/07/2021 Updated: 22/12/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows malicious users to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exiv2 exiv2 0.27.3

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #991706 exiv2: CVE-2021-31292 Package: src:exiv2; Maintainer for src:exiv2 is Debian KDE Extras Team <pkg-kde-extras@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 30 Jul 2021 13:27:06 UTC Severity: important Tags: security, upstream Found in versi ...
Several vulnerabilities have been discovered in Exiv2, a C++ library and a command line utility to manage image metadata which could result in denial of service or the execution of arbitrary code if a malformed file is parsed For the stable distribution (buster), these problems have been fixed in version 025-4+deb10u2 We recommend that you upgra ...
A flaw was found in exiv2 A integer wraparound in the CrwMap:encode0x1810 function leads to memcpy call with a very large size allowing an attacker, who can provide a malicious image, to crash an application which uses the exiv2 library The highest threat from this vulnerability is to service availability ...