CVE-2021-3482 — Improper Input Validation in Exiv2
Severity
6.5MEDIUMNVD
OSV7.8
EPSS
0.2%
top 57.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateMay 24
Description
A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:LExploitability: 3.9 | Impact: 2.5
Affected Packages8 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 33, 34, Enterprise Linux 8.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffe↗2021-04-13
Debian▶
CVE-2021-3482: exiv2 - A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper ...↗2021