7.5
CVSSv2

CVE-2012-2840

Published: 13/07/2012 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) prior to 0.6.21 allows remote malicious users to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libexif project libexif 0.6.14

libexif project libexif 0.6.15

libexif project libexif 0.6.16

libexif project libexif 0.6.18

libexif project libexif 0.6.19

libexif project libexif

Vendor Advisories

Synopsis Moderate: libexif security update Type/Severity Security Advisory: Moderate Topic Updated libexif packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulne ...
Debian Bug report logs - #681454 libexif: Overflow security vulnerabilities (CVE-2012-2812, CVE-2012-2813, CVE-2012-2814, CVE-2012-2836, CVE-2012-2837, CVE-2012-2840, CVE-2012-2841, CVE-2012-2845) Package: libexif; Maintainer for libexif is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported ...
libexif could be made to crash, run programs as your login, or expose sensitive information if it opened a specially crafted file ...
Multiple flaws were found in the way libexif processed Exif tags An attacker could create a specially-crafted image file that, when opened in an application linked against libexif, could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application ...