PT-2021-4547 · Exiv2 +9 · Exiv2 +9

Guilherme De Almeida Suckevicz

+1

·

Published

2021-04-05

·

Updated

2025-01-10

·

CVE-2021-3482

CVSS v3.1
6.5
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

Name of the Vulnerable Software and Affected Versions:

Exiv2 versions prior to 0.27.4-RC1

Description:

The issue is related to the `Jp2Image::readMetadata()` function in the `jp2image.cpp` component of the Exiv2 library, which is used for managing media file metadata. The problem arises from improper input validation of the `rawData.size` property. This can lead to a heap-based buffer overflow when a specially crafted JPG image containing malicious EXIF data is processed. As a result, a remote attacker could potentially gain access to confidential data and cause a denial of service.

Recommendations:

For Exiv2 versions prior to 0.27.4-RC1, consider updating to a version later than 0.27.4-RC1 to resolve the issue.

As a temporary workaround, consider restricting the use of the `Jp2Image::readMetadata()` function in `jp2image.cpp` until a patch is available.

Avoid using the `rawData.size` property in the affected `Jp2Image::readMetadata()` function until the issue is resolved.

Fix

RCE

Memory Corruption

Buffer Overflow

Weakness Enumeration

Related Identifiers

ALSA-2021:4173
ALT-PU-2021-2006
ALT-PU-2021-3308
ALT-PU-2024-13399
BDU:2021-05214
CESA-2021_4173
CVE-2021-3482
DLA-2750-1
DSA-4958-1
MGASA-2021-0240
RHSA-2021:4173
RHSA-2021_4173
RLSA-2021:4173
USN-4941-1

Affected Products

Alt Linux
Almalinux
Astra Linux
Centos
Exiv2
Linuxmint
Red Hat
Red Os
Rocky Linux
Ubuntu