{"id":"CVE-2018-19107","details":"In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file.","modified":"2026-05-18T05:50:27.582274981Z","published":"2018-11-08T08:29:00.370Z","related":["ALSA-2020:1577"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"18.10"},{"last_affected":"19.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"],"vendor_product":"canonical:ubuntu_linux"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"},{"last_affected":"10.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_workstation"}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2101"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00038.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4056-1/"},{"type":"FIX","url":"https://github.com/Exiv2/exiv2/issues/427"},{"type":"FIX","url":"https://github.com/Exiv2/exiv2/pull/518"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exiv2/exiv2","events":[{"introduced":"0"},{"last_affected":"fa449a4d2c58d63f0d75ff259f25683a98a44630"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"0.26"}],"cpe":"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*"}}],"versions":["v0.26","v0.25","v0.24","v0.23.1","v0.23","v0.22","v0.21.1","v0.21","v0.20","v0.19","v0.18.2","v0.18.1","v0.18","v0.18-pre2","v0.18-pre1","v0.17.1","v0.17","v0.16","v0.16-pre1","v0.15","v0.14","v0.13","v0.12","v0.11","v0.10","v0.9.1","v0.9","v0.8","v0.7","v0.6.2","v0.6.1","v0.6","v0.5","v0.4","v0.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19107.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}