In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
{ "binaries": [ { "binary_name": "exiv2", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "exiv2-dbgsym", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "libexiv2-14", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "libexiv2-14-dbgsym", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "libexiv2-dbg", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "libexiv2-dev", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "libexiv2-dev-dbgsym", "binary_version": "0.25-2.1ubuntu16.04.6" }, { "binary_name": "libexiv2-doc", "binary_version": "0.25-2.1ubuntu16.04.6" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "exiv2", "binary_version": "0.25-3.1ubuntu0.18.04.5" }, { "binary_name": "libexiv2-14", "binary_version": "0.25-3.1ubuntu0.18.04.5" }, { "binary_name": "libexiv2-dbg", "binary_version": "0.25-3.1ubuntu0.18.04.5" }, { "binary_name": "libexiv2-dev", "binary_version": "0.25-3.1ubuntu0.18.04.5" }, { "binary_name": "libexiv2-doc", "binary_version": "0.25-3.1ubuntu0.18.04.5" } ], "availability": "No subscription required" }