A flaw was found in Exiv2 0.26. There is a integer underflow, leading to a heap-based buffer over-read, in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file or, possibly, disclose memory data. References: https://bugzilla.redhat.com/show_bug.cgi?id=1524107 https://github.com/Exiv2/exiv2/issues/210
Created exiv2 tracking bugs for this issue: Affects: fedora-all [bug 1545238]
Introduced by: https://github.com/Exiv2/exiv2/commit/bdf8d3ad5b7275b10eef3a0e3a713859cb3f6c2f https://github.com/Exiv2/exiv2/commit/6e19d043efcf8425fdd08cd8a856d1c46528cf10 https://github.com/Exiv2/exiv2/commit/09c734fbcd98b3ae880a90d669569c95242f477e
Statement: This issue did not affect the versions of Exiv2 as shipped with Red Hat Enterprise Linux 6 and 7 as they did not include support for printing IPTC Photo Metadata.
*** Bug 1564284 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2101 https://access.redhat.com/errata/RHSA-2019:2101
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-17724