4.3
CVSSv2

CVE-2007-6351

Published: 20/12/2007 Updated: 15/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

libexif 0.6.16 and previous versions allows context-dependent malicious users to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.

Affected Products

Vendor Product Versions
Curtis GallowayLibexif0.6.14, 0.6.15, 0.6.16

Vendor Advisories

Meder Kydyraliev discovered that libexif did not correctly handle certain EXIF headers If a user or automated system were tricked into processing a specially crafted image, a remote attacker could cause the application linked against libexif to crash, leading to a denial of service, or possibly executing arbitrary code with user privileges ...
Debian Bug report logs - #457330 libexif: CVE-2007-6351 CVE-2007-6352 multiple integer flows leading to denial of service and arbitrary code execution Package: libexif; Maintainer for libexif is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported by: Nico Golde <nion@debianorg> Date ...

References

NVD-CWE-Otherhttp://bugs.gentoo.org/show_bug.cgi?id=202350http://osvdb.org/42652http://secunia.com/advisories/28076http://secunia.com/advisories/28127http://secunia.com/advisories/28195http://secunia.com/advisories/28266http://secunia.com/advisories/28346http://secunia.com/advisories/28400http://secunia.com/advisories/28636http://secunia.com/advisories/28776http://secunia.com/advisories/32274http://security.gentoo.org/glsa/glsa-200712-15.xmlhttp://www.debian.org/security/2008/dsa-1487http://www.mandriva.com/security/advisories?name=MDVSA-2008:005http://www.novell.com/linux/security/advisories/suse_security_summary_report.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1165.htmlhttp://www.securityfocus.com/archive/1/485822/100/0/threadedhttp://www.securityfocus.com/bid/26976http://www.securitytracker.com/id?1019124http://www.ubuntu.com/usn/usn-654-1http://www.vupen.com/english/advisories/2007/4278https://bugzilla.redhat.com/show_bug.cgi?id=425551https://bugzilla.redhat.com/show_bug.cgi?id=425621https://bugzilla.redhat.com/show_bug.cgi?id=425631https://exchange.xforce.ibmcloud.com/vulnerabilities/39166https://issues.rpath.com/browse/RPL-2068https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9420https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.htmlhttps://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2007-6351https://nvd.nist.govhttps://usn.ubuntu.com/654-1/https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-654-1