Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2018-19535

In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of service (application crash due to a heap-based buffer over-read) via a crafted PNG file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.8%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.3
Products affected by CVE-2018-19535
  • Exiv2 » Exiv2 » Version: N/A
    cpe:2.3:a:exiv2:exiv2:-
  • Exiv2 » Exiv2 » Version: 0.10
    cpe:2.3:a:exiv2:exiv2:0.10
  • Exiv2 » Exiv2 » Version: 0.11
    cpe:2.3:a:exiv2:exiv2:0.11
  • Exiv2 » Exiv2 » Version: 0.12
    cpe:2.3:a:exiv2:exiv2:0.12
  • Exiv2 » Exiv2 » Version: 0.13
    cpe:2.3:a:exiv2:exiv2:0.13
  • Exiv2 » Exiv2 » Version: 0.14
    cpe:2.3:a:exiv2:exiv2:0.14
  • Exiv2 » Exiv2 » Version: 0.15
    cpe:2.3:a:exiv2:exiv2:0.15
  • Exiv2 » Exiv2 » Version: 0.16
    cpe:2.3:a:exiv2:exiv2:0.16
  • Exiv2 » Exiv2 » Version: 0.17
    cpe:2.3:a:exiv2:exiv2:0.17
  • Exiv2 » Exiv2 » Version: 0.17.1
    cpe:2.3:a:exiv2:exiv2:0.17.1
  • Exiv2 » Exiv2 » Version: 0.18
    cpe:2.3:a:exiv2:exiv2:0.18
  • Exiv2 » Exiv2 » Version: 0.18.1
    cpe:2.3:a:exiv2:exiv2:0.18.1
  • Exiv2 » Exiv2 » Version: 0.18.2
    cpe:2.3:a:exiv2:exiv2:0.18.2
  • Exiv2 » Exiv2 » Version: 0.19
    cpe:2.3:a:exiv2:exiv2:0.19
  • Exiv2 » Exiv2 » Version: 0.20
    cpe:2.3:a:exiv2:exiv2:0.20
  • Exiv2 » Exiv2 » Version: 0.21
    cpe:2.3:a:exiv2:exiv2:0.21
  • Exiv2 » Exiv2 » Version: 0.21.1
    cpe:2.3:a:exiv2:exiv2:0.21.1
  • Exiv2 » Exiv2 » Version: 0.22
    cpe:2.3:a:exiv2:exiv2:0.22
  • Exiv2 » Exiv2 » Version: 0.23
    cpe:2.3:a:exiv2:exiv2:0.23
  • Exiv2 » Exiv2 » Version: 0.24
    cpe:2.3:a:exiv2:exiv2:0.24
  • Exiv2 » Exiv2 » Version: 0.25
    cpe:2.3:a:exiv2:exiv2:0.25
  • Exiv2 » Exiv2 » Version: 0.26
    cpe:2.3:a:exiv2:exiv2:0.26
  • Exiv2 » Exiv2 » Version: 0.3
    cpe:2.3:a:exiv2:exiv2:0.3
  • Exiv2 » Exiv2 » Version: 0.4
    cpe:2.3:a:exiv2:exiv2:0.4
  • Exiv2 » Exiv2 » Version: 0.5
    cpe:2.3:a:exiv2:exiv2:0.5
  • Exiv2 » Exiv2 » Version: 0.6
    cpe:2.3:a:exiv2:exiv2:0.6
  • Exiv2 » Exiv2 » Version: 0.6.1
    cpe:2.3:a:exiv2:exiv2:0.6.1
  • Exiv2 » Exiv2 » Version: 0.6.2
    cpe:2.3:a:exiv2:exiv2:0.6.2
  • Exiv2 » Exiv2 » Version: 0.7
    cpe:2.3:a:exiv2:exiv2:0.7
  • Exiv2 » Exiv2 » Version: 0.8
    cpe:2.3:a:exiv2:exiv2:0.8
  • Exiv2 » Exiv2 » Version: 0.9
    cpe:2.3:a:exiv2:exiv2:0.9
  • Exiv2 » Exiv2 » Version: 0.9.1
    cpe:2.3:a:exiv2:exiv2:0.9.1
  • Canonical » Ubuntu Linux » Version: 16.04
    cpe:2.3:o:canonical:ubuntu_linux:16.04
  • Canonical » Ubuntu Linux » Version: 18.04
    cpe:2.3:o:canonical:ubuntu_linux:18.04
  • Canonical » Ubuntu Linux » Version: 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • Canonical » Ubuntu Linux » Version: 19.04
    cpe:2.3:o:canonical:ubuntu_linux:19.04
  • Debian » Debian Linux » Version: 10.0
    cpe:2.3:o:debian:debian_linux:10.0
  • Debian » Debian Linux » Version: 8.0
    cpe:2.3:o:debian:debian_linux:8.0
  • Redhat » Enterprise Linux Desktop » Version: 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • Redhat » Enterprise Linux Server » Version: 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0


Contact Us

Shodan ® - All rights reserved