CVE-2019-13111

A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/', 'name': 'FEDORA-2019-60553d5a18', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/ -

03 Mar 2023, 18:41

Type Values Removed Values Added
First Time Fedoraproject
Fedoraproject fedora
CPE cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/ - Mailing List, Third Party Advisory
References (MISC) https://github.com/Exiv2/exiv2/issues/791 - Exploit, Third Party Advisory (MISC) https://github.com/Exiv2/exiv2/issues/791 - Exploit, Issue Tracking, Patch

Information

Published : 2019-06-30 23:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-13111

Mitre link : CVE-2019-13111

CVE.ORG link : CVE-2019-13111


JSON object : View

Products Affected

fedoraproject

  • fedora

exiv2

  • exiv2
CWE
CWE-190

Integer Overflow or Wraparound