Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN120 _____________________________________________________________________ DATE : 25/02/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Exiv2 versions prior to 0.28.5. ===================================================================== https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7 _____________________________________________________________________ Use After Free in TiffSubIfd Moderate kevinbackhouse published GHSA-38h4-fx85-qcx7 Feb 18, 2025 Package Exiv2 Affected versions 0.28.0 to 0.28.4 Patched versions 0.28.5 Description Impact A heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are not affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as fixiso. Patches The bug is fixed in version v0.28.5. References Issue: #3168 Fix: #3174 For more information Please see our security policy for information about Exiv2 security. Severity Moderate CVE ID CVE-2025-26623 Weaknesses CWE-416 Credits @Marsman1996 Marsman1996 Finder ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================