Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2012-2841

Published: 13 July 2012

Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.

Priority

Medium

Status

Package Release Status
libexif
Launchpad, Ubuntu, Debian
hardy
Released (0.6.16-2.1ubuntu0.2)
lucid
Released (0.6.19-1ubuntu0.1)
natty
Released (0.6.20-0ubuntu1.1)
oneiric
Released (0.6.20-1ubuntu0.1)
precise
Released (0.6.20-2ubuntu0.1)
upstream
Released (0.6.20-3,0.6.21)
Patches:
vendor: https://bugzilla.novell.com/attachment.cgi?id=498457
upstream: http://libexif.cvs.sourceforge.net/viewvc/libexif/libexif/libexif/exif-entry.c?r1=1.148&r2=1.149&view=patch