Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2021-32617: Moderate: exiv2 security, bug fix, and enhancement update (CESA-2021:4173)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

CentOS Linux: CVE-2021-32617: Moderate: exiv2 security, bug fix, and enhancement update (CESA-2021:4173)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
05/17/2021
Created
11/11/2021
Added
11/10/2021
Modified
05/25/2023

Description

Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An inefficient algorithm (quadratic complexity) was found in Exiv2 versions v0.27.3 and earlier. The inefficient algorithm is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `rm`.

Solution(s)

  • centos-upgrade-exiv2
  • centos-upgrade-exiv2-debuginfo
  • centos-upgrade-exiv2-debugsource
  • centos-upgrade-exiv2-libs
  • centos-upgrade-exiv2-libs-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;