Published: 13/07/2012 Updated: 28/11/2016
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) prior to 0.6.21 allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.

Affected Products

Vendor Product Versions
Curtis GallowayLibexif0.6.14, 0.6.15, 0.6.16, 0.6.18, 0.6.19, 0.6.20

Vendor Advisories

Synopsis Moderate: libexif security update Type/Severity Security Advisory: Moderate Topic Updated libexif packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulne ...
libexif could be made to crash, run programs as your login, or expose sensitive information if it opened a specially crafted file ...
Debian Bug report logs - #681454 libexif: Overflow security vulnerabilities (CVE-2012-2812, CVE-2012-2813, CVE-2012-2814, CVE-2012-2836, CVE-2012-2837, CVE-2012-2840, CVE-2012-2841, CVE-2012-2845) Package: libexif; Maintainer for libexif is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported ...
Multiple flaws were found in the way libexif processed Exif tags An attacker could create a specially-crafted image file that, when opened in an application linked against libexif, could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application ...