Log

CVE-2021-29458 edited at 18 Jun 2021 17:35:01
Remote
- Local
+ Remote
Description
- An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file.
+ An out-of-bounds read was found in Exiv2 before version 0.27.4. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file.
Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert.
-
- The bug is fixed in version v0.27.4.
CVE-2021-29457 edited at 18 Jun 2021 17:34:24
Description
A heap buffer overflow was found in Exiv2 before version 0.27.4. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.
-
- The bug is fixed in version v0.27.4.
CVE-2021-29457 edited at 18 Jun 2021 17:34:14
Remote
- Local
+ Remote
Description
- A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
+ A heap buffer overflow was found in Exiv2 before version 0.27.4. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`.
The bug is fixed in version v0.27.4.
CVE-2021-3482 edited at 18 Jun 2021 17:33:15
Remote
- Local
+ Remote
Description
- A security issue was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4.
+ A security issue was found in Exiv2 in versions before version 0.27.4. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
ASA-202106-44 edited at 18 Jun 2021 15:50:04
ASA-202106-43 edited at 18 Jun 2021 15:50:01
ASA-202106-42 edited at 18 Jun 2021 15:49:58
AVG-2082 edited at 18 Jun 2021 14:22:14
References
https://vivaldi.com/blog/desktop/minor-update-for-vivaldi-desktop-browser-4-0/
+ https://vivaldi.com/blog/desktop/minor-update-3-for-vivaldi-desktop-browser-4-0/
Notes
- Vivaldi version 4.0.2312.27 is based on Chromium version 91.0.4472.102 according to the reference.
+ Vivaldi version 4.0.2312.27 is based on Chromium version 91.0.4472.102, Vivaldi version 4.0.2312.33 is based on Chromium version 91.0.4472.114 according to the references.
AVG-2085 edited at 18 Jun 2021 13:48:29
Severity
- Unknown
+ Medium
CVE-2021-3610 edited at 18 Jun 2021 13:48:29
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
Description
+ A heap-based buffer overflow vulnerability was found in ImageMagick in ReadTIFFImage() in coders/tiff.c because of an incorrect setting of the pixel array size which can lead to crash and segmentation fault. This flaw affects ImageMagick versions prior to 7.1.0-0 and 7.0.11-14.
References
+ https://bugzilla.redhat.com/show_bug.cgi?id=1973689
+ https://github.com/ImageMagick/ImageMagick/commit/930ff0d1a9bc42925a7856e9ea53f5fc9f318bf3
Notes
AVG-2085 created at 18 Jun 2021 13:47:22
Packages
+ imagemagick
Issues
+ CVE-2021-3610
Status
+ Fixed
Severity
+ Unknown
Affected
+ 7.0.11.13-3
Fixed
+ 7.0.11.14-1
Ticket
Advisory qualified
+ No
References
Notes
CVE-2021-3610 created at 18 Jun 2021 13:47:22