Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-4676Improper Restriction of Operations within the Bounds of a Memory Buffer in Exiv2

6 documents6 sources
Severity
5.0MEDIUMNVD
EPSS
12.8%
top 5.94%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 31
Latest updateDec 15

Description

Buffer overflow in Andreas Huggel Exiv2 before 0.9 does not null terminate strings before calling the sscanf function, which allows remote attackers to cause a denial of service (application crash) via images with crafted IPTC metadata.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

NVDandreas_huggel/exiv28 versions+7
debiandebian/exiv2< exiv2 0.9 (bookworm)
Debianexiv2/exiv2< 0.9+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r744-c99h-q8c4: Buffer overflow in Andreas Huggel Exiv2 before 02022-05-01
OSV
CVE-2005-4676: Buffer overflow in Andreas Huggel Exiv2 before 02005-12-31

💥Exploits & PoCs

1
Exploit-DB
Exiv2 - Corrupted EXIF Data Denial of Service2006-01-26

📋Vendor Advisories

1
Debian
CVE-2005-4676: exiv2 - Buffer overflow in Andreas Huggel Exiv2 before 0.9 does not null terminate strin...2005

📄Research Papers

1
arXiv
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference2024-12-15