Lucene search

K
gentooGentoo FoundationGLSA-200503-17
HistoryMar 12, 2005 - 12:00 a.m.

libexif: Buffer overflow vulnerability

2005-03-1200:00:00
Gentoo Foundation
security.gentoo.org
15

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.056 Low

EPSS

Percentile

93.3%

Background

libexif is a library for parsing, editing and saving EXIF data.

Description

libexif contains a buffer overflow vulnerability in the EXIF tag validation code. When opening an image with a specially crafted EXIF tag, the lack of validation can cause applications linked to libexif to crash.

Impact

A specially crafted EXIF file could crash applications making use of libexif, potentially allowing the execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All libexif users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.5.12-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/libexif< 0.5.12-r1UNKNOWN

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.056 Low

EPSS

Percentile

93.3%