
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-32815 affects Exiv2, a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The vulnerability was discovered in versions 0.27.4 and earlier, and was fixed in version 0.27.5. This security issue involves an assertion failure in crwimage_int.cpp that can be triggered when processing crafted image files (GitHub Advisory).
The vulnerability manifests as an assertion failure in the crwimage_int.cpp file when Exiv2 is used to modify the metadata of a crafted image file. The issue specifically occurs during metadata modification operations, which is a less frequently used functionality compared to metadata reading. To trigger the vulnerability in the Exiv2 command-line application, additional command-line arguments such as 'fi' are required. The vulnerability has been assigned a CVSS v3.1 base score indicating Low severity with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N (GitHub Advisory).
An attacker could potentially exploit this vulnerability to cause a denial of service by triggering the assertion failure, if they can trick the victim into running Exiv2 on a specially crafted image file (Ubuntu Security).
The vulnerability has been fixed in Exiv2 version 0.27.5. Users are advised to upgrade to this version or later to address the security issue. The fix was implemented through a pull request (#1739) that addresses the assertion failure (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."