Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-29463
HistoryApr 30, 2021 - 12:00 a.m.

CVE-2021-29463 Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata

2021-04-3000:00:00
CWE-125
GitHub_M
www.cve.org
7
exiv2
out-of-bounds read
webpimage
metadata
image files
vulnerability
denial of service
crafted file
command-line utility
c++ library
exploit
version v0.27.4

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

33.5%

Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.

CNA Affected

[
  {
    "vendor": "Exiv2",
    "product": "exiv2",
    "versions": [
      {
        "version": "< 0.27.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

33.5%