TITLE: Exiv2 IPTC Metadata Processing Denial of Service SECUNIA ADVISORY ID: SA18619 VERIFY ADVISORY: http://secunia.com/advisories/18619/ CRITICAL: Not critical IMPACT: DoS WHERE: Local system SOFTWARE: Exiv2 0.x http://secunia.com/product/7039/ DESCRIPTION: A vulnerability has been reported in Exiv2, which potentially can be exploited by malicious people to crash certain applications on a user's system. The vulnerability is caused due to the use of the "sscanf()" function on input file data that is not NULL terminated. This can cause out-of-bounds memory access and may be exploited to crash an application linked against the Exiv2 library when a image containing specially-crafted IPTC metadata is processed. The vulnerability has been reported in version 0.8. Prior versions may also be affected. SOLUTION: Update to version 0.9. http://home.arcor.de/ahuggel/exiv2/download.html PROVIDED AND/OR DISCOVERED BY: The vendor credits Maciek. ORIGINAL ADVISORY: http://dev.robotbattle.com/mantis/bug_view_advanced_page.php?bug_id=447 http://home.arcor.de/ahuggel/exiv2/changelog.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------