Full Disclosure mailing list archives
[ GLSA 200503-17 ] libexif: Buffer overflow vulnerability
From: Luke Macken <lewk () gentoo org>
Date: Sat, 12 Mar 2005 15:38:51 -0500
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200503-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: libexif: Buffer overflow vulnerability
Date: March 12, 2005
Bugs: #84076
ID: 200503-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
libexif fails to validate certain inputs, making it vulnerable to
buffer overflows.
Background
==========
libexif is a library for parsing, editing and saving EXIF data.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/libexif < 0.5.12-r1 >= 0.5.12-r1
Description
===========
libexif contains a buffer overflow vulnerability in the EXIF tag
validation code. When opening an image with a specially crafted EXIF
tag, the lack of validation can cause applications linked to libexif to
crash.
Impact
======
A specially crafted EXIF file could crash applications making use of
libexif, potentially allowing the execution of arbitrary code with the
privileges of the user running the application.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All libexif users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libexif-0.5.12-r1"
References
==========
[ 1 ] CAN-2005-0664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200503-17.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://www.secunia.com/
Current thread:
- [ GLSA 200503-17 ] libexif: Buffer overflow vulnerability Luke Macken (Mar 12)
