Bug 1564277 (CVE-2018-9144)

Summary: CVE-2018-9144 exiv2: out-of-bounds read in Exiv2::Internal::binaryToString in image.cpp
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jgrulich, michel, rdieter
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
An out-of-bound read has been found in Exiv2 in the way binary bytes are converted to string. An attacker could potentially use this flaw to crash the Exiv2 CLI utility program by tricking it into processing a crafted TIFF image.
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-04-17 09:22:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1564278, 1564279, 1564285    
Bug Blocks: 1564287    

Description Laura Pardo 2018-04-05 21:35:54 UTC
A flaw was found in Exiv2 0.26, there is an out-of-bounds read in Exiv2::Internal::binaryToString in image.cpp. This could result in a denial of service or information disclosure. 


References:
https://github.com/Exiv2/exiv2/issues/254
https://bugzilla.novell.com/show_bug.cgi?id=1087877

Comment 1 Laura Pardo 2018-04-05 21:36:22 UTC
Created exiv2 tracking bugs for this issue:

Affects: fedora-all [bug 1564279]

Comment 4 Riccardo Schirone 2018-04-17 09:21:42 UTC
Statement:

This issue did not affect the versions of Exiv2 as shipped with Red Hat Enterprise Linux 6 and 7.