{ "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37615", "STATE": "PUBLIC", "TITLE": "Null pointer dereference in Exiv2::Internal::resolveLens0x319" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "exiv2", "version": { "version_data": [ { "version_value": "<= 0.27.4" } ] } } ] }, "vendor_name": "Exiv2" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A null pointer dereference was found in Exiv2 versions v0.27.4 and earlier. The null pointer dereference is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476: NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Exiv2/exiv2/pull/1758", "refsource": "MISC", "url": "https://github.com/Exiv2/exiv2/pull/1758" }, { "name": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w", "refsource": "CONFIRM", "url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w" }, { "refsource": "FEDORA", "name": "FEDORA-2021-399f869889", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/" }, { "refsource": "FEDORA", "name": "FEDORA-2021-cbaef8e2d5", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/" }, { "refsource": "GENTOO", "name": "GLSA-202312-06", "url": "https://security.gentoo.org/glsa/202312-06" } ] }, "source": { "advisory": "GHSA-h9x9-4f77-336w", "discovery": "UNKNOWN" } }