{"id":"CVE-2017-9239","details":"An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.","aliases":["PYSEC-2017-112"],"modified":"2026-03-15T14:25:45.529012Z","published":"2017-05-26T10:29:00.177Z","related":["SUSE-SU-2020:0860-1","SUSE-SU-2020:0921-1","openSUSE-SU-2020:0482-1","openSUSE-SU-2024:12399-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html"},{"type":"WEB","url":"https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test%28exiv2%29"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/98720"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3852-1/"},{"type":"REPORT","url":"http://dev.exiv2.org/issues/1295"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exiv2/exiv2","events":[{"introduced":"0"},{"last_affected":"fa449a4d2c58d63f0d75ff259f25683a98a44630"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.26"}]}}],"versions":["v0.10","v0.11","v0.12","v0.13","v0.14","v0.15","v0.16","v0.16-pre1","v0.17","v0.17.1","v0.18","v0.18-pre1","v0.18-pre2","v0.18.1","v0.18.2","v0.19","v0.20","v0.21","v0.21.1","v0.22","v0.23","v0.23.1","v0.24","v0.25","v0.26","v0.3","v0.4","v0.5","v0.6","v0.6.1","v0.6.2","v0.7","v0.8","v0.9","v0.9.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9239.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}