Lucene search

K
gentooGentoo FoundationGLSA-200706-01
HistoryJun 05, 2007 - 12:00 a.m.

libexif: Integer overflow vulnerability

2007-06-0500:00:00
Gentoo Foundation
security.gentoo.org
13

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.399 Low

EPSS

Percentile

97.2%

Background

libexif is a library for parsing, editing and saving Exif data.

Description

Victor Stinner reported an integer overflow in the exif_data_load_data_entry() function from file exif-data.c while handling Exif data.

Impact

An attacker could entice a user to process a file with specially crafted Exif extensions with an application making use of libexif, which will trigger the integer overflow and potentially execute arbitrary code or crash the application.

Workaround

There is no known workaround at this time.

Resolution

All libexif users should upgrade to the latest version. Please note that users upgrading from “<=media-libs/libexif-0.6.13” should also run revdep-rebuild after their upgrade.

 # emerge --sync
 # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.15"
 # revdep-rebuild --library=/usr/lib/libexif.so
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/libexif< 0.6.15UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.399 Low

EPSS

Percentile

97.2%