Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-20097
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.006
EPSS Ranking
69.6%
CVSS Severity
CVSS v3 Score
6.5
CVSS v2 Score
4.3
References
https://access.redhat.com/errata/RHSA-2019:2101
https://github.com/Exiv2/exiv2/issues/590
https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206
https://lists.debian.org/debian-lts-announce/2019/02/msg00038.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXCEKTYF7HLM6VH2WCWO2HXTJH37MBLA/
https://access.redhat.com/errata/RHSA-2019:2101
https://github.com/Exiv2/exiv2/issues/590
https://github.com/TeamSeri0us/pocs/tree/master/exiv2/20181206
https://lists.debian.org/debian-lts-announce/2019/02/msg00038.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXCEKTYF7HLM6VH2WCWO2HXTJH37MBLA/
Products affected by CVE-2018-20097
Exiv2
»
Exiv2
»
Version:
0.27
cpe:2.3:a:exiv2:exiv2:0.27
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Redhat
»
Enterprise Linux Dekstop
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_dekstop:7.0
Redhat
»
Enterprise Linux Server
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0
Redhat
»
Enterprise Linux Workstation
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved