{"id":"CVE-2018-17581","details":"CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service.","modified":"2026-04-11T12:07:45.295570Z","published":"2018-09-28T09:29:00.903Z","related":["ALSA-2020:1577","SUSE-SU-2020:0860-1","SUSE-SU-2022:4208-1","SUSE-SU-2022:4276-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"14.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"18.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"10.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2101"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00038.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3852-1/"},{"type":"FIX","url":"https://github.com/Exiv2/exiv2/issues/460"},{"type":"FIX","url":"https://github.com/SegfaultMasters/covering360/blob/master/Exiv2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exiv2/exiv2","events":[{"introduced":"0"},{"last_affected":"fa449a4d2c58d63f0d75ff259f25683a98a44630"},{"last_affected":"62826516778b96da5ddb38f5ec1499dc76994a6f"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"0.26"},{"last_affected":"0.27"}],"source":"CPE_FIELD","cpe":["cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*","cpe:2.3:a:exiv2:exiv2:0.27:*:*:*:*:*:*:*"]}}],"versions":["0.27","0.27-RC2","0.27-RC3","v0.10","v0.11","v0.12","v0.13","v0.14","v0.15","v0.16","v0.16-pre1","v0.17","v0.17.1","v0.18","v0.18-pre1","v0.18-pre2","v0.18.1","v0.18.2","v0.19","v0.20","v0.21","v0.21.1","v0.22","v0.23","v0.23.1","v0.24","v0.25","v0.26","v0.27-RC1","v0.27.0","v0.3","v0.4","v0.5","v0.6","v0.6.1","v0.6.2","v0.7","v0.8","v0.9","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-17581.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}