Description
This affects versions of the package exifreader before 4.39.0. A crafted image containing an ICC mluc tag can set an attacker-controlled record count together with a zero record size. During parsing, ExifReader repeatedly processes the same record and appends entries to an array without sufficient bounds validation, causing excessive memory growth. In applications that parse attacker-supplied images, this may lead to denial of service through memory exhaustion.
Problem types
Improper Validation of Specified Quantity in Input
Credits
Yuki Matsuhashi
References
security.snyk.io/vuln/SNYK-JS-EXIFREADER-16689335
security.snyk.io/vuln/SNYK-JS-EXIFREADER-16689335
gist.github.com/...tsuhashi/3243ea38e5fbf8cfe19b624f04c9f4b4
github.com/...ommit/c9d88b67e127b2dcc7b46e328df468257fb2dc30