### [CVE-2021-29623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29623) ![](https://img.shields.io/static/v1?label=Product&message=exiv2&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%20v0.27.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=%7B%22CWE-908%22%3A%22Use%20of%20Uninitialized%20Resource%22%7D&color=brightgreen) ### Description Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The read of uninitialized memory is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to leak a few bytes of stack memory, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.4. ### POC #### Reference - https://github.com/Exiv2/exiv2/pull/1627 #### Github No PoCs found on GitHub currently.