5.5 CVE-2025-55304
Patch Exploit
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A denial-of-service was found in Exiv2 version 0.28.5: a quadratic algorithm in the ICC profile parsing code in jpegBase::readMetadata() can cause Exiv2 to run for a long time. The denial-of-service is triggered when Exiv2 is used to read the metadata of a crafted jpg image file. The bug is fixed in version 0.28.6.
https://nvd.nist.gov/vuln/detail/CVE-2025-55304
Categories
CWE-407 : Inefficient Algorithmic Complexity
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached. Used when the algorithmic complexity is related to the square of the number of inputs (N^2) C++ library for image metadata has "quadratic complexity" issue with unnecessarily repetitive parsing each time an invalid character is encountered Python has "quadratic complexity" issue when converting string to int with many digits in unexpected bases server allows ReDOS with crafted User-Agent strings, due to overlapping capture groups that cause excessive backtracking. Perl-based email address parser has "quadratic complexity" issue via a string that does not contain a valid address CPU consumption via inputs that cause many hash table collisions. CPU consumption via inputs that cause many hash table collisions. Product performs unnecessary processing before dropping an invalid packet. CPU and memory consumption using many wildcards. Product allows attackers to cause multiple copies of a program to be loaded more quickly than the program can detect that other copies are running, then exit. This type of error should probably have its own category, where teardown takes more time than initialization. Network monitoring system allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a "backtracking attack." Wiki allows remote attackers to cause a denial of service (CPU consumption) by performing a diff between large, crafted pages that trigger the worst case algorithmic complexity. Wiki allows remote attackers to cause a denial of service (CPU consumption) by performing a diff between large, crafted pages that trigger the worst case algorithmic complexity. OS allows attackers to cause a denial of service (CPU consumption) via crafted Gregorian dates. Memory leak by performing actions faster than the software can clear them.
References
security-advisories@github.com Patch Exploit
https://github.com/Exiv2/exiv2/issues/3333 Exploit Issue Tracking |
https://github.com/Exiv2/exiv2/pull/3335 Patch |
https://github.com/Exiv2/exiv2/pull/3345 Patch |
https://github.com/Exiv2/exiv2/security/advisories/GHSA-m54q-mm9w-fp6g Third Party Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:* | < 0.28.6 |
REMEDIATION
Patch
Url |
---|
https://github.com/Exiv2/exiv2/pull/3335 |
https://github.com/Exiv2/exiv2/pull/3345 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
https://github.com/Exiv2/exiv2/issues/3333 |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.