Bug 2248428 (CVE-2023-44398) - CVE-2023-44398 exiv2: Out of bounds write in function BmffImage::brotliUncompress
Summary: CVE-2023-44398 exiv2: Out of bounds write in function BmffImage::brotliUncomp...
Keywords:
Status: NEW
Alias: CVE-2023-44398
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2248429
TreeView+ depends on / blocked
 
Reported: 2023-11-07 01:54 UTC by Pedro Sampaio
Modified: 2023-12-08 11:47 UTC (History)
0 users

Fixed In Version: exiv2 0.28.1
Doc Type: ---
Doc Text:
An out-of-bounds write vulnerability has been identified in the Exiv2 library within the BmffImage::brotliUncompress() function. This issue arises when Exiv2 is employed to extract metadata from a manipulated image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2023-11-07 01:54:45 UTC
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References:

https://github.com/Exiv2/exiv2/security/advisories/GHSA-hrw9-ggg3-3r4r
https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5


Note You need to log in before you can comment on or make changes to this bug.