Published: 14/06/2007 Updated: 17/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif prior to 0.6.16 allows remote malicious users to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow.

Affected Products

Vendor Product Versions
LibexifLibexif0.6.9, 0.6.11, 0.6.12, 0.6.13, 0.6.14, 0.6.15

Vendor Advisories

Sean Larsson discovered that libexif did not correctly verify the size of EXIF components By tricking a user into opening an image with specially crafted EXIF headers, a remote attacker could cause the application using libexif to execute arbitrary code with user privileges ...
Debian Bug report logs - #430012 CVE-2006-4168: Integer overflow vulnerability fixed in 0616 Package: libexif12; Maintainer for libexif12 is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Source for libexif12 is src:libexif (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@debianorg&g ...