2024-07-09 16:03:13 +00:00

127 lines
4.0 KiB
JSON

{
"id": "CVE-2024-39695",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-08T16:15:08.700",
"lastModified": "2024-07-09T14:47:19.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 version v0.28.2. The vulnerability is in the parser for the ASF video format, which was a new feature in v0.28.0. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted video file. The bug is fixed in version v0.28.3."
},
{
"lang": "es",
"value": "Exiv2 es una utilidad de l\u00ednea de comandos y una librer\u00eda de C++ para leer, escribir, eliminar y modificar los metadatos de archivos de imagen. Se encontr\u00f3 una lectura fuera de los l\u00edmites en la versi\u00f3n v0.28.2 de Exiv2. La vulnerabilidad est\u00e1 en el analizador del formato de v\u00eddeo ASF, que era una caracter\u00edstica nueva en la versi\u00f3n 0.28.0. La lectura fuera de los l\u00edmites se activa cuando se utiliza Exiv2 para leer los metadatos de un archivo de v\u00eddeo creado. El error se solucion\u00f3 en la versi\u00f3n v0.28.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.28.0",
"versionEndExcluding": "0.28.3",
"matchCriteriaId": "E1304EB2-11F0-41A7-A09E-75EC5F40340C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Exiv2/exiv2/commit/3a28346db5ae1735a8728fe3491b0aecc1dbf387",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Exiv2/exiv2/pull/3006",
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-38rv-8x93-pvrh",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}