mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-09 16:04:06 +00:00
- Synchronized data.
This commit is contained in:
parent
7c521687ba
commit
9235dfc56c
@ -34,7 +34,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file."
|
"value" : "In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the \"!= 0x1c\" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -56,6 +56,16 @@
|
|||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1524107",
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1524107",
|
||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1524107"
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1524107"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://github.com/Exiv2/exiv2/issues/263",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://github.com/Exiv2/exiv2/issues/263"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,30 +2,7 @@
|
|||||||
"CVE_data_meta" : {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
"ID" : "CVE-2018-9306",
|
"ID" : "CVE-2018-9306",
|
||||||
"STATE" : "PUBLIC"
|
"STATE" : "REJECT"
|
||||||
},
|
|
||||||
"affects" : {
|
|
||||||
"vendor" : {
|
|
||||||
"vendor_data" : [
|
|
||||||
{
|
|
||||||
"product" : {
|
|
||||||
"product_data" : [
|
|
||||||
{
|
|
||||||
"product_name" : "n/a",
|
|
||||||
"version" : {
|
|
||||||
"version_data" : [
|
|
||||||
{
|
|
||||||
"version_value" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type" : "CVE",
|
"data_type" : "CVE",
|
||||||
@ -34,33 +11,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "In Exiv2 0.26, an out-of-bounds read in IptcData::printStructure in iptc.c could result in a crash or information leak, related to the \"!= 0x1c\" case."
|
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-17724. Reason: This candidate is a reservation duplicate of CVE-2017-17724. Notes: All CVE users should reference CVE-2017-17724 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype" : {
|
|
||||||
"problemtype_data" : [
|
|
||||||
{
|
|
||||||
"description" : [
|
|
||||||
{
|
|
||||||
"lang" : "eng",
|
|
||||||
"value" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references" : {
|
|
||||||
"reference_data" : [
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/Exiv2/exiv2/issues/263",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/Exiv2/exiv2/issues/263"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/xiaoqx/pocs/blob/master/exiv2/readme.md"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user