CVE-2021-3482 log

Source
Severity Low
Remote Yes
Type Arbitrary code execution
Description
A security issue was found in Exiv2 in versions before version 0.27.4. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
Group Package Affected Fixed Severity Status Ticket
AVG-1772 exiv2 0.27.3-1 0.27.4-1 Low Fixed
Date Advisory Group Package Severity Type
22 Jun 2021 ASA-202106-54 AVG-1772 exiv2 Low multiple issues
References
https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jp9-m3fv-2vg9
https://github.com/Exiv2/exiv2/issues/1522
https://github.com/Exiv2/exiv2/pull/1523
https://github.com/Exiv2/exiv2/commit/22ea582c6b74ada30bec3a6b15de3c3e52f2b4da