Secunia Security Advisory - A vulnerability has been reported in Exiv2, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.
b1be5c02feba3847c3bf1868476b42648e67a133aa68295f539ab19136c9fabe
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
----------------------------------------------------------------------
TITLE:
Exiv2 EXIF Parsing Integer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA28132
VERIFY ADVISORY:
http://secunia.com/advisories/28132/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
Exiv2 0.x
http://secunia.com/product/7039/
DESCRIPTION:
A vulnerability has been reported in Exiv2, which can be exploited by
malicious people to cause a DoS (Denial of Service) or to potentially
compromise an application using the library.
The vulnerability is caused due to an integer overflow error in
src/exif.cpp. This can be exploited to cause a buffer overflow via
specially crafted EXIF files and may allow execution of arbitrary
code.
The vulnerability is reported in version 0.15. Other versions may
also be affected.
SOLUTION:
Fixed in the CVS repository.
http://dev.robotbattle.com/~cvsuser/cgi-bin/ns_viewcvs.cgi/exiv2/trunk/src/exif.cpp?rev=1346&r1=1231&r2=1346
PROVIDED AND/OR DISCOVERED BY:
Red Hat credits Meder Kydyraliev.
ORIGINAL ADVISORY:
https://bugzilla.redhat.com/show_bug.cgi?id=425921
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------