CVE-2025-54080
BaseFortify
Publication date: 2025-08-29
Last updated on: 2025-09-02
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| exiv2 | exiv2 | to 0.28.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-54080 is a low-severity vulnerability in the Exiv2 library, specifically an out-of-bounds read occurring when writing metadata into a specially crafted EPS image file. This happens because the library does not properly validate certain position and size fields in the EPS file header, leading to reading memory outside intended boundaries. Exploiting this requires tricking a user into running Exiv2 on a malicious EPS file with metadata writing operations, which are less common than reading operations. The vulnerability can cause the application to crash (denial of service) but does not expose or alter data. It was fixed in Exiv2 version 0.28.6 by adding strict bounds checking and error handling. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by causing a denial of service if an attacker tricks you into running Exiv2 on a specially crafted EPS image file that triggers the out-of-bounds read during metadata writing. The application may crash due to a segmentation fault, disrupting normal operations. However, it does not lead to information disclosure or data integrity compromise. The attack requires local access and user interaction to invoke the vulnerable metadata writing operation. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability primarily causes a denial of service by crashing the Exiv2 application and does not result in unauthorized disclosure or modification of data. Therefore, it has minimal or no direct impact on compliance with data protection standards and regulations such as GDPR or HIPAA, which focus on confidentiality and integrity of personal data. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to run Exiv2 version 0.28.5 or earlier to write metadata on a crafted EPS image file that triggers the out-of-bounds read. Specifically, using the Exiv2 command-line tool with a metadata writing operation such as 'delete' on a malicious EPS file may cause a crash (segmentation fault). For example, a command like `exiv2 delete malicious.eps` could trigger the vulnerability if the file is crafted to exploit it. Detection involves monitoring for crashes or segmentation faults during such operations. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Exiv2 to version 0.28.6 or later, where the vulnerability is fixed. The fix includes improved bounds checking and validation of EPS file metadata sections to prevent out-of-bounds reads. Until upgrading, avoid running metadata writing operations on untrusted or suspicious EPS image files to reduce the risk of exploitation. [1, 2]