A flaw was found in Exiv2 0.26, there is a integer wraparound in the Exiv2::Image::printIFDStructure function, leading to a heap-based buffer over-read in the Exiv2::Image::byteSwap4 function in image.cpp. Remote attackers can exploit this vulnerability to disclose memory data or cause a denial of service via a crafted TIFF file. References: https://bugzilla.redhat.com/show_bug.cgi?id=1524104 https://github.com/Exiv2/exiv2/issues/229
Created exiv2 tracking bugs for this issue: Affects: fedora-all [bug 1545250]
Patches: https://github.com/Exiv2/exiv2/commit/6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97 https://github.com/Exiv2/exiv2/commit/74cb5bab132ed76adf15df172c5e8b58cddaa96c
Statement: This issue did not affect the versions of Exiv2 as shipped with Red Hat Enterprise Linux 6 and 7.