4.3
CVSSv2

CVE-2007-6351

Published: 20/12/2007 Updated: 26/01/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

libexif 0.6.16 and previous versions allows context-dependent malicious users to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libexif project libexif 0.6.14

libexif project libexif 0.6.15

libexif project libexif

Vendor Advisories

Debian Bug report logs - #457330 libexif: CVE-2007-6351 CVE-2007-6352 multiple integer flows leading to denial of service and arbitrary code execution Package: libexif; Maintainer for libexif is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported by: Nico Golde <nion@debianorg> Date ...
Meder Kydyraliev discovered that libexif did not correctly handle certain EXIF headers If a user or automated system were tricked into processing a specially crafted image, a remote attacker could cause the application linked against libexif to crash, leading to a denial of service, or possibly executing arbitrary code with user privileges ...

References

NVD-CWE-Otherhttps://bugzilla.redhat.com/show_bug.cgi?id=425551http://www.redhat.com/support/errata/RHSA-2007-1165.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=425621https://bugzilla.redhat.com/show_bug.cgi?id=425631http://bugs.gentoo.org/show_bug.cgi?id=202350https://issues.rpath.com/browse/RPL-2068https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.htmlhttp://security.gentoo.org/glsa/glsa-200712-15.xmlhttp://www.securitytracker.com/id?1019124http://secunia.com/advisories/28076http://secunia.com/advisories/28127http://secunia.com/advisories/28195http://secunia.com/advisories/28266http://secunia.com/advisories/28346http://www.mandriva.com/security/advisories?name=MDVSA-2008:005http://secunia.com/advisories/28400http://www.novell.com/linux/security/advisories/suse_security_summary_report.htmlhttp://secunia.com/advisories/28636http://www.debian.org/security/2008/dsa-1487http://www.securityfocus.com/bid/26976http://secunia.com/advisories/28776http://www.ubuntu.com/usn/usn-654-1http://secunia.com/advisories/32274http://osvdb.org/42652http://www.vupen.com/english/advisories/2007/4278https://exchange.xforce.ibmcloud.com/vulnerabilities/39166https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9420http://www.securityfocus.com/archive/1/485822/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457330https://usn.ubuntu.com/654-1/https://nvd.nist.gov