Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag.
Link | Tags |
---|---|
http://securitytracker.com/id?1013398 | patch vdb entry |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1 | vendor advisory |
http://www.debian.org/security/2005/dsa-709 | patch vendor advisory |
https://usn.ubuntu.com/91-1/ | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml | patch vendor advisory |
http://www.vupen.com/english/advisories/2005/0240 | vdb entry |
https://bugzilla.ubuntu.com/show_bug.cgi?id=7152 | patch |
http://www.vupen.com/english/advisories/2005/2565 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832 | signature vdb entry |
http://secunia.com/advisories/17705 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:064 | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-300.html | vendor advisory |