[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1533 exiftags -- insufficient input sanitizing

ID: oval:org.mitre.oval:def:7793Date: (C)2009-12-15   (M)2021-06-02
Class: PATCHFamily: unix




Christian Schmid and Meder Kydyraliev (Google Security) discovered a number of vulnerabilities in exiftags, a utility for extracting EXIF metadata from JPEG images. The Common Vulnerabilities and Exposures project identified the following three problems: Inadequate EXIF property validation could lead to invalid memory accesses if executed on a maliciously crafted image, potentially including heap corruption and the execution of arbitrary code. Flawed data validation could lead to integer overflows, causing other invalid memory accesses, also with the potential for memory corruption or arbitrary code execution. Cyclical EXIF image file directory (IFD) references could cause a denial of service (infinite loop).

Platform:
Debian 4.0
Debian 3.1
Product:
exiftags
Reference:
DSA-1533
CVE-2007-6354
CVE-2007-6355
CVE-2007-6356
CVE    3
CVE-2007-6354
CVE-2007-6355
CVE-2007-6356
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:3.1

© SecPod Technologies