6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
libexiv2.so is vulnerable to denial of service (DoS). The attack is possible because it does not handle a NULL
return from the functions strchr
or strstr
if a malicious server provides a string without a space character or without a blank line, crashing the application due to null pointer dereference.
lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html
github.com/Exiv2/exiv2/commit/c1bee7319a8b9e0d38f1988d70dc4fa5c52b83d1
github.com/Exiv2/exiv2/issues/793
github.com/Exiv2/exiv2/pull/815
lists.debian.org/debian-lts-announce/2023/01/msg00004.html
lists.fedoraproject.org/archives/list/[email protected]/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/
support.f5.com/csp/article/K45429077?utm_source=f5support&utm_medium=RSS
usn.ubuntu.com/4056-1/
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P