Integer Overflow or Wraparound Affecting exempi package, versions *
Threat Intelligence
EPSS
0.35% (73rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-EXEMPI-296973
- published 15 Mar 2018
- disclosed 15 Mar 2018
How to fix?
There is no fixed version for Debian:9 exempi.
NVD Description
Note: Versions mentioned in the description apply only to the upstream exempi package and not the exempi package as distributed by Debian.
See How to fix? for Debian:9 relevant fixed versions and status.
An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
References
- https://security-tracker.debian.org/tracker/CVE-2017-18233
- https://bugs.freedesktop.org/show_bug.cgi?id=102151
- https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://access.redhat.com/errata/RHSA-2019:2048
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-18233
- https://usn.ubuntu.com/3668-1/