CVE-2014-9449:Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24 allows remote attackers to cause a denial of service (crash) via a long IKEY INFO tag value in an AVI file.

splash
Back

Description Preview

This CVE concerns a buffer overflow in Exiv2 0.24 caused by improper handling of the IKEY INFO tag within AVI file metadata. When an attacker supplies a crafted AVI containing an excessively long IKEY INFO tag value, the RiffVideo::infoTagsHandler routine can overflow a buffer, leading to a denial of service (crash) of the software that uses Exiv2 to parse image metadata. The vulnerability is triggered remotely by processing a manipulated AVI file and affects Exiv2 version 0.24, with multiple security advisories (across Ubuntu, Fedora, Gentoo, Secunia, and others) coordinating a remediation through updated releases and patches.

Overview

Exiv2 0.24 contains a buffer overflow in the RiffVideo::infoTagsHandler function when parsing AVI metadata, which can be exploited by a crafted AVI file containing a very long IKEY INFO tag value. This allows a remote attacker to cause a denial of service by crashing the application that processes the image metadata. The issue has been acknowledged by multiple vendors and security advisories, highlighting the need to upgrade to patched releases.

Remediation

  • Upgrade Exiv2 to a patched release (0.25 or newer) as recommended by vendor advisories (e.g., Ubuntu USN-2454-1, Fedora 2015-0301, Gentoo GLSA 201507-03) to include the fix for this vulnerability.
  • If upgrading is not immediately possible, apply the official patch referenced by Exiv2 issue discussions (for example, review and apply the diff mentioned in the repository (rev 3264 to 3263) or equivalent patch) to address the IKEY INFO tag handling.
  • Rebuild affected applications against the patched Exiv2 library and redeploy.
  • Validate the fix by testing with a crafted AVI file containing a long IKEY INFO tag to ensure the crash no longer occurs.
  • Consider additional hardening: implement input length checks for IKEY INFO tags and enable memory-safety practices when parsing AVI metadata to prevent similar overflows in the future.

References

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing: Low
    Manufacturing
  2. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  3. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  4. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  5. Public Administration: Low
    Public Administration
  6. Retail Trade: Low
    Retail Trade
  7. Transportation & Warehousing: Low
    Transportation & Warehousing
  8. Accommodation & Food Services: Low
    Accommodation & Food Services
  9. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  10. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  11. Construction: Low
    Construction
  12. Educational Services: Low
    Educational Services
  13. Finance and Insurance: Low
    Finance and Insurance
  14. Information: Low
    Information
  15. Mining: Low
    Mining
  16. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  17. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  18. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background