A design flaw in image processing software that modifies JPEG images might not modify the original EXIF thumbnail, which could lead to an information leak of potentially sensitive visual information that had been removed from the main JPEG image.
The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.
Link | Tags |
---|---|
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt | exploit vendor advisory |
http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html | third party advisory mailing list |