{"id":"CVE-2018-16336","details":"Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.","modified":"2026-05-18T05:51:31.799449570Z","published":"2018-09-02T03:29:00.997Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"18.10"}],"vendor_product":"canonical:ubuntu_linux","cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://github.com/Exiv2/exiv2/issues/400"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00012.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3852-1/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exiv2/exiv2","events":[{"introduced":"0"},{"last_affected":"fa449a4d2c58d63f0d75ff259f25683a98a44630"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"0.26"}],"cpe":"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v0.26","v0.25","v0.24","v0.23.1","v0.23","v0.22","v0.21.1","v0.21","v0.20","v0.19","v0.18.2","v0.18.1","v0.18","v0.18-pre2","v0.18-pre1","v0.17.1","v0.17","v0.16","v0.16-pre1","v0.15","v0.14","v0.13","v0.12","v0.11","v0.10","v0.9.1","v0.9","v0.8","v0.7","v0.6.2","v0.6.1","v0.6","v0.5","v0.4","v0.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-16336.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}