libexif contains a buffer overflow vulnerability in the EXIF tag
validation code. When opening an image with a specially crafted EXIF
tag, the lack of validation can cause applications linked to libexif to
crash.
Impact
======
A specially crafted EXIF file could crash applications making use of
libexif, potentially allowing the execution of arbitrary code with the
privileges of the user running the application.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All libexif users should upgrade to the latest version:
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security (at) gentoo (dot) org [email concealed] or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
Gentoo Linux Security Advisory GLSA 200503-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: libexif: Buffer overflow vulnerability
Date: March 12, 2005
Bugs: #84076
ID: 200503-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
libexif fails to validate certain inputs, making it vulnerable to
buffer overflows.
Background
==========
libexif is a library for parsing, editing and saving EXIF data.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/libexif < 0.5.12-r1 >= 0.5.12-r1
Description
===========
libexif contains a buffer overflow vulnerability in the EXIF tag
validation code. When opening an image with a specially crafted EXIF
tag, the lack of validation can cause applications linked to libexif to
crash.
Impact
======
A specially crafted EXIF file could crash applications making use of
libexif, potentially allowing the execution of arbitrary code with the
privileges of the user running the application.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All libexif users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libexif-0.5.12-r1"
References
==========
[ 1 ] CAN-2005-0664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200503-17.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security (at) gentoo (dot) org [email concealed] or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
[ reply ]