{"uuid": "e1ba744a-59b2-4ccb-9de8-62331d2af72f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-44398", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5613", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-44398\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2023-11-06T17:30:54.394Z\n\ud83d\udccf Modified: 2025-02-26T21:15:17.204Z\n\ud83d\udd17 References:\n1. https://github.com/Exiv2/exiv2/security/advisories/GHSA-hrw9-ggg3-3r4r\n2. https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5\n3. https://security.gentoo.org/glsa/202312-06", "creation_timestamp": "2025-02-26T21:25:26.000000Z"}