There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Exiv2/exiv2/issues/187 | Exploit Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html | Mailing List Third Party Advisory | 
| https://usn.ubuntu.com/3852-1/ | Third Party Advisory | 
| https://github.com/Exiv2/exiv2/issues/187 | Exploit Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html | Mailing List Third Party Advisory | 
| https://usn.ubuntu.com/3852-1/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    21 Nov 2024, 03:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/Exiv2/exiv2/issues/187 - Exploit, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html - Mailing List, Third Party Advisory | |
| References | () https://usn.ubuntu.com/3852-1/ - Third Party Advisory | 
Information
                Published : 2017-12-13 22:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-17669
Mitre link : CVE-2017-17669
CVE.ORG link : CVE-2017-17669
JSON object : View
Products Affected
                canonical
- ubuntu_linux
exiv2
- exiv2
debian
- debian_linux
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
