6.5
CVSSv3

CVE-2021-3482

Published: 08/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 6.5 | Impact Score: 2.5 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exiv2 exiv2 0.27.4

exiv2 exiv2

redhat enterprise linux 8.0

fedoraproject fedora 33

fedoraproject fedora 34

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #986888 exiv2: CVE-2021-3482 Package: src:exiv2; Maintainer for src:exiv2 is Debian KDE Extras Team <pkg-kde-extras@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 13 Apr 2021 13:30:01 UTC Severity: important Tags: security, upstream Found in versio ...
Several vulnerabilities have been discovered in Exiv2, a C++ library and a command line utility to manage image metadata which could result in denial of service or the execution of arbitrary code if a malformed file is parsed For the stable distribution (buster), these problems have been fixed in version 025-4+deb10u2 We recommend that you upgra ...
No description is available for this CVE ...
A security issue was found in Exiv2 An improper check of the rawDatasize property in Jp2Image::readMetadata() in jp2imagecpp can lead to a heap-based buffer overflow ...