Vulnerabilites related to libexif - libexif
cve-2006-4168
Vulnerability from cvelistv5
Published
2007-06-14 19:00
Modified
2024-08-07 18:57
Severity ?
Summary
Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif before 0.6.16 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow.
References
http://www.novell.com/linux/security/advisories/2007_39_libexif.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/25717/third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26083third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_14_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/24461vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/34851vdb-entry, x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDKSA-2007:128vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2007/dsa-1310vendor-advisory, x_refsource_DEBIAN
http://sourceforge.net/project/shownotes.php?release_id=515385x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200706-09.xmlvendor-advisory, x_refsource_GENTOO
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543third-party-advisory, x_refsource_IDEFENSE
http://www.securitytracker.com/id?1018240vdb-entry, x_refsource_SECTRACK
http://www.ubuntu.com/usn/usn-478-1vendor-advisory, x_refsource_UBUNTU
https://rhn.redhat.com/errata/RHSA-2007-0501.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/25746third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25768third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25645third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25674third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25842third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349vdb-entry, signature, x_refsource_OVAL
http://osvdb.org/35379vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/25820third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25932third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2165vdb-entry, x_refsource_VUPEN
https://issues.rpath.com/browse/RPL-1482x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/472046/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/25642third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:57:46.261Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SA:2007:039",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
          },
          {
            "name": "25717",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25717/"
          },
          {
            "name": "26083",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26083"
          },
          {
            "name": "SUSE-SR:2007:014",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
          },
          {
            "name": "24461",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24461"
          },
          {
            "name": "multiple-libexif-exifdataloaddataentry-bo(34851)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34851"
          },
          {
            "name": "MDKSA-2007:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:128"
          },
          {
            "name": "DSA-1310",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1310"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=515385"
          },
          {
            "name": "GLSA-200706-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200706-09.xml"
          },
          {
            "name": "20070613 Multiple Vendor libexif Integer Overflow Heap Corruption Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543"
          },
          {
            "name": "1018240",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018240"
          },
          {
            "name": "USN-478-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-478-1"
          },
          {
            "name": "RHSA-2007:0501",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2007-0501.html"
          },
          {
            "name": "25746",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25746"
          },
          {
            "name": "25768",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25768"
          },
          {
            "name": "25645",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25645"
          },
          {
            "name": "25674",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25674"
          },
          {
            "name": "25842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25842"
          },
          {
            "name": "oval:org.mitre.oval:def:9349",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349"
          },
          {
            "name": "35379",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35379"
          },
          {
            "name": "25820",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25820"
          },
          {
            "name": "25932",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25932"
          },
          {
            "name": "ADV-2007-2165",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2165"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1482"
          },
          {
            "name": "20070622 FLEA-2007-0028-1: libexif",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/472046/100/0/threaded"
          },
          {
            "name": "25642",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25642"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif before 0.6.16 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SA:2007:039",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
        },
        {
          "name": "25717",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25717/"
        },
        {
          "name": "26083",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26083"
        },
        {
          "name": "SUSE-SR:2007:014",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
        },
        {
          "name": "24461",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24461"
        },
        {
          "name": "multiple-libexif-exifdataloaddataentry-bo(34851)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34851"
        },
        {
          "name": "MDKSA-2007:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:128"
        },
        {
          "name": "DSA-1310",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1310"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=515385"
        },
        {
          "name": "GLSA-200706-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200706-09.xml"
        },
        {
          "name": "20070613 Multiple Vendor libexif Integer Overflow Heap Corruption Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543"
        },
        {
          "name": "1018240",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018240"
        },
        {
          "name": "USN-478-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-478-1"
        },
        {
          "name": "RHSA-2007:0501",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2007-0501.html"
        },
        {
          "name": "25746",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25746"
        },
        {
          "name": "25768",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25768"
        },
        {
          "name": "25645",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25645"
        },
        {
          "name": "25674",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25674"
        },
        {
          "name": "25842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25842"
        },
        {
          "name": "oval:org.mitre.oval:def:9349",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349"
        },
        {
          "name": "35379",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35379"
        },
        {
          "name": "25820",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25820"
        },
        {
          "name": "25932",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25932"
        },
        {
          "name": "ADV-2007-2165",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2165"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1482"
        },
        {
          "name": "20070622 FLEA-2007-0028-1: libexif",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/472046/100/0/threaded"
        },
        {
          "name": "25642",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25642"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4168",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif before 0.6.16 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SA:2007:039",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
            },
            {
              "name": "25717",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25717/"
            },
            {
              "name": "26083",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26083"
            },
            {
              "name": "SUSE-SR:2007:014",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
            },
            {
              "name": "24461",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24461"
            },
            {
              "name": "multiple-libexif-exifdataloaddataentry-bo(34851)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34851"
            },
            {
              "name": "MDKSA-2007:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:128"
            },
            {
              "name": "DSA-1310",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1310"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=515385",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=515385"
            },
            {
              "name": "GLSA-200706-09",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200706-09.xml"
            },
            {
              "name": "20070613 Multiple Vendor libexif Integer Overflow Heap Corruption Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543"
            },
            {
              "name": "1018240",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018240"
            },
            {
              "name": "USN-478-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-478-1"
            },
            {
              "name": "RHSA-2007:0501",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2007-0501.html"
            },
            {
              "name": "25746",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25746"
            },
            {
              "name": "25768",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25768"
            },
            {
              "name": "25645",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25645"
            },
            {
              "name": "25674",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25674"
            },
            {
              "name": "25842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25842"
            },
            {
              "name": "oval:org.mitre.oval:def:9349",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349"
            },
            {
              "name": "35379",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35379"
            },
            {
              "name": "25820",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25820"
            },
            {
              "name": "25932",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25932"
            },
            {
              "name": "ADV-2007-2165",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2165"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1482",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1482"
            },
            {
              "name": "20070622 FLEA-2007-0028-1: libexif",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/472046/100/0/threaded"
            },
            {
              "name": "25642",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25642"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4168",
    "datePublished": "2007-06-14T19:00:00",
    "dateReserved": "2006-08-16T00:00:00",
    "dateUpdated": "2024-08-07T18:57:46.261Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6352
Vulnerability from cvelistv5
Published
2007-12-20 02:00
Modified
2024-08-07 16:02
Severity ?
Summary
Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
References
http://www.redhat.com/support/errata/RHSA-2007-1166.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814vdb-entry, signature, x_refsource_OVAL
http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1vendor-advisory, x_refsource_SUNALERT
http://security.gentoo.org/glsa/glsa-200712-15.xmlvendor-advisory, x_refsource_GENTOO
https://issues.rpath.com/browse/RPL-2068x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/suse_security_summary_report.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/28195third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=425631x_refsource_CONFIRM
http://secunia.com/advisories/32274third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/26942vdb-entry, x_refsource_BID
http://secunia.com/advisories/28776third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28076third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/42653vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/28346third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/485822/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0947/referencesvdb-entry, x_refsource_VUPEN
http://bugs.gentoo.org/show_bug.cgi?id=202350x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=425621x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029vdb-entry, signature, x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/39167vdb-entry, x_refsource_XF
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.htmlvendor-advisory, x_refsource_FEDORA
https://bugzilla.redhat.com/show_bug.cgi?id=425561x_refsource_CONFIRM
http://www.securitytracker.com/id?1019124vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/4278vdb-entry, x_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/29381third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-1165.htmlvendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2008/dsa-1487vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/28636third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28266third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28400third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:005vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/28127third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-654-1vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:02:36.715Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2007:1166",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1166.html"
          },
          {
            "name": "oval:org.mitre.oval:def:4814",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814"
          },
          {
            "name": "234701",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1"
          },
          {
            "name": "GLSA-200712-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200712-15.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2068"
          },
          {
            "name": "SUSE-SR:2008:002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"
          },
          {
            "name": "28195",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28195"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425631"
          },
          {
            "name": "32274",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32274"
          },
          {
            "name": "26942",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26942"
          },
          {
            "name": "28776",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28776"
          },
          {
            "name": "28076",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28076"
          },
          {
            "name": "42653",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42653"
          },
          {
            "name": "28346",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28346"
          },
          {
            "name": "20080105 rPSA-2008-0006-1 libexif",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/485822/100/0/threaded"
          },
          {
            "name": "ADV-2008-0947",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0947/references"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=202350"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425621"
          },
          {
            "name": "oval:org.mitre.oval:def:11029",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029"
          },
          {
            "name": "libexif-exifdataloaddatathumbnail-bo(39167)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39167"
          },
          {
            "name": "FEDORA-2007-4608",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425561"
          },
          {
            "name": "1019124",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019124"
          },
          {
            "name": "ADV-2007-4278",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4278"
          },
          {
            "name": "FEDORA-2007-4667",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html"
          },
          {
            "name": "29381",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29381"
          },
          {
            "name": "RHSA-2007:1165",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-1165.html"
          },
          {
            "name": "DSA-1487",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1487"
          },
          {
            "name": "28636",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28636"
          },
          {
            "name": "28266",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28266"
          },
          {
            "name": "28400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28400"
          },
          {
            "name": "MDVSA-2008:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:005"
          },
          {
            "name": "28127",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28127"
          },
          {
            "name": "USN-654-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-654-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2007:1166",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1166.html"
        },
        {
          "name": "oval:org.mitre.oval:def:4814",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814"
        },
        {
          "name": "234701",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1"
        },
        {
          "name": "GLSA-200712-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200712-15.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2068"
        },
        {
          "name": "SUSE-SR:2008:002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"
        },
        {
          "name": "28195",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28195"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425631"
        },
        {
          "name": "32274",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32274"
        },
        {
          "name": "26942",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26942"
        },
        {
          "name": "28776",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28776"
        },
        {
          "name": "28076",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28076"
        },
        {
          "name": "42653",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42653"
        },
        {
          "name": "28346",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28346"
        },
        {
          "name": "20080105 rPSA-2008-0006-1 libexif",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/485822/100/0/threaded"
        },
        {
          "name": "ADV-2008-0947",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0947/references"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=202350"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425621"
        },
        {
          "name": "oval:org.mitre.oval:def:11029",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029"
        },
        {
          "name": "libexif-exifdataloaddatathumbnail-bo(39167)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39167"
        },
        {
          "name": "FEDORA-2007-4608",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425561"
        },
        {
          "name": "1019124",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019124"
        },
        {
          "name": "ADV-2007-4278",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4278"
        },
        {
          "name": "FEDORA-2007-4667",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html"
        },
        {
          "name": "29381",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29381"
        },
        {
          "name": "RHSA-2007:1165",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-1165.html"
        },
        {
          "name": "DSA-1487",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1487"
        },
        {
          "name": "28636",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28636"
        },
        {
          "name": "28266",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28266"
        },
        {
          "name": "28400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28400"
        },
        {
          "name": "MDVSA-2008:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:005"
        },
        {
          "name": "28127",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28127"
        },
        {
          "name": "USN-654-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-654-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6352",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2007:1166",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1166.html"
            },
            {
              "name": "oval:org.mitre.oval:def:4814",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814"
            },
            {
              "name": "234701",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1"
            },
            {
              "name": "GLSA-200712-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200712-15.xml"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2068",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2068"
            },
            {
              "name": "SUSE-SR:2008:002",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"
            },
            {
              "name": "28195",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28195"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=425631",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425631"
            },
            {
              "name": "32274",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32274"
            },
            {
              "name": "26942",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26942"
            },
            {
              "name": "28776",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28776"
            },
            {
              "name": "28076",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28076"
            },
            {
              "name": "42653",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42653"
            },
            {
              "name": "28346",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28346"
            },
            {
              "name": "20080105 rPSA-2008-0006-1 libexif",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/485822/100/0/threaded"
            },
            {
              "name": "ADV-2008-0947",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0947/references"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=202350",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=202350"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=425621",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425621"
            },
            {
              "name": "oval:org.mitre.oval:def:11029",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029"
            },
            {
              "name": "libexif-exifdataloaddatathumbnail-bo(39167)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39167"
            },
            {
              "name": "FEDORA-2007-4608",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=425561",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425561"
            },
            {
              "name": "1019124",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019124"
            },
            {
              "name": "ADV-2007-4278",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4278"
            },
            {
              "name": "FEDORA-2007-4667",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html"
            },
            {
              "name": "29381",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29381"
            },
            {
              "name": "RHSA-2007:1165",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-1165.html"
            },
            {
              "name": "DSA-1487",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1487"
            },
            {
              "name": "28636",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28636"
            },
            {
              "name": "28266",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28266"
            },
            {
              "name": "28400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28400"
            },
            {
              "name": "MDVSA-2008:005",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:005"
            },
            {
              "name": "28127",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28127"
            },
            {
              "name": "USN-654-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-654-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6352",
    "datePublished": "2007-12-20T02:00:00",
    "dateReserved": "2007-12-14T00:00:00",
    "dateUpdated": "2024-08-07T16:02:36.715Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2645
Vulnerability from cvelistv5
Published
2007-05-14 21:00
Modified
2024-08-07 13:49
Severity ?
Summary
Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
References
http://www.securityfocus.com/archive/1/470502/100/100/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/25599third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200706-01.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/25235third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_39_libexif.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/26083third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/25540third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28776third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_14_sr.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/25621third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:118vendor-advisory, x_refsource_MANDRIVA
http://sourceforge.net/project/shownotes.php?release_id=507447x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/34233vdb-entry, x_refsource_XF
http://secunia.com/advisories/25569third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1761vdb-entry, x_refsource_VUPEN
http://sourceforge.net/tracker/index.php?func=detail&aid=1716196&group_id=12272&atid=112272x_refsource_MISC
http://osvdb.org/35978vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/25932third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1487vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/usn-471-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/23927vdb-entry, x_refsource_BID
https://issues.rpath.com/browse/RPL-1431x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:56.305Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070604 FLEA-2007-0024-1: libexif",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/470502/100/100/threaded"
          },
          {
            "name": "25599",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25599"
          },
          {
            "name": "GLSA-200706-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200706-01.xml"
          },
          {
            "name": "25235",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25235"
          },
          {
            "name": "SUSE-SA:2007:039",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
          },
          {
            "name": "26083",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26083"
          },
          {
            "name": "25540",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25540"
          },
          {
            "name": "28776",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28776"
          },
          {
            "name": "SUSE-SR:2007:014",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
          },
          {
            "name": "25621",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25621"
          },
          {
            "name": "MDKSA-2007:118",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:118"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=507447"
          },
          {
            "name": "libexif-exifdataloaddata-integer-overflow(34233)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34233"
          },
          {
            "name": "25569",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25569"
          },
          {
            "name": "ADV-2007-1761",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1761"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1716196\u0026group_id=12272\u0026atid=112272"
          },
          {
            "name": "35978",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35978"
          },
          {
            "name": "25932",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25932"
          },
          {
            "name": "DSA-1487",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1487"
          },
          {
            "name": "USN-471-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-471-1"
          },
          {
            "name": "23927",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23927"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1431"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070604 FLEA-2007-0024-1: libexif",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/470502/100/100/threaded"
        },
        {
          "name": "25599",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25599"
        },
        {
          "name": "GLSA-200706-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200706-01.xml"
        },
        {
          "name": "25235",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25235"
        },
        {
          "name": "SUSE-SA:2007:039",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
        },
        {
          "name": "26083",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26083"
        },
        {
          "name": "25540",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25540"
        },
        {
          "name": "28776",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28776"
        },
        {
          "name": "SUSE-SR:2007:014",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
        },
        {
          "name": "25621",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25621"
        },
        {
          "name": "MDKSA-2007:118",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:118"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=507447"
        },
        {
          "name": "libexif-exifdataloaddata-integer-overflow(34233)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34233"
        },
        {
          "name": "25569",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25569"
        },
        {
          "name": "ADV-2007-1761",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1761"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1716196\u0026group_id=12272\u0026atid=112272"
        },
        {
          "name": "35978",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35978"
        },
        {
          "name": "25932",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25932"
        },
        {
          "name": "DSA-1487",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1487"
        },
        {
          "name": "USN-471-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-471-1"
        },
        {
          "name": "23927",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23927"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1431"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070604 FLEA-2007-0024-1: libexif",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/470502/100/100/threaded"
            },
            {
              "name": "25599",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25599"
            },
            {
              "name": "GLSA-200706-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200706-01.xml"
            },
            {
              "name": "25235",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25235"
            },
            {
              "name": "SUSE-SA:2007:039",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
            },
            {
              "name": "26083",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26083"
            },
            {
              "name": "25540",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25540"
            },
            {
              "name": "28776",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28776"
            },
            {
              "name": "SUSE-SR:2007:014",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
            },
            {
              "name": "25621",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25621"
            },
            {
              "name": "MDKSA-2007:118",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:118"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=507447",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=507447"
            },
            {
              "name": "libexif-exifdataloaddata-integer-overflow(34233)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34233"
            },
            {
              "name": "25569",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25569"
            },
            {
              "name": "ADV-2007-1761",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1761"
            },
            {
              "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1716196\u0026group_id=12272\u0026atid=112272",
              "refsource": "MISC",
              "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1716196\u0026group_id=12272\u0026atid=112272"
            },
            {
              "name": "35978",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35978"
            },
            {
              "name": "25932",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25932"
            },
            {
              "name": "DSA-1487",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1487"
            },
            {
              "name": "USN-471-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-471-1"
            },
            {
              "name": "23927",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23927"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1431",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1431"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2645",
    "datePublished": "2007-05-14T21:00:00",
    "dateReserved": "2007-05-14T00:00:00",
    "dateUpdated": "2024-08-07T13:49:56.305Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0664
Vulnerability from cvelistv5
Published
2005-03-08 05:00
Modified
2024-08-07 21:21
Severity ?
Summary
Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag.
References
http://securitytracker.com/id?1013398vdb-entry, x_refsource_SECTRACK
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1vendor-advisory, x_refsource_SUNALERT
http://www.debian.org/security/2005/dsa-709vendor-advisory, x_refsource_DEBIAN
https://usn.ubuntu.com/91-1/vendor-advisory, x_refsource_UBUNTU
http://www.gentoo.org/security/en/glsa/glsa-200503-17.xmlvendor-advisory, x_refsource_GENTOO
http://www.vupen.com/english/advisories/2005/0240vdb-entry, x_refsource_VUPEN
https://bugzilla.ubuntu.com/show_bug.cgi?id=7152x_refsource_MISC
http://www.vupen.com/english/advisories/2005/2565vdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/17705third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2005:064vendor-advisory, x_refsource_MANDRAKE
http://www.redhat.com/support/errata/RHSA-2005-300.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:21:06.522Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1013398",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013398"
          },
          {
            "name": "102041",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1"
          },
          {
            "name": "DSA-709",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-709"
          },
          {
            "name": "USN-91-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/91-1/"
          },
          {
            "name": "GLSA-200503-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml"
          },
          {
            "name": "ADV-2005-0240",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/0240"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=7152"
          },
          {
            "name": "ADV-2005-2565",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2565"
          },
          {
            "name": "oval:org.mitre.oval:def:10832",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832"
          },
          {
            "name": "17705",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17705"
          },
          {
            "name": "MDKSA-2005:064",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:064"
          },
          {
            "name": "RHSA-2005:300",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-300.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1013398",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013398"
        },
        {
          "name": "102041",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1"
        },
        {
          "name": "DSA-709",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-709"
        },
        {
          "name": "USN-91-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/91-1/"
        },
        {
          "name": "GLSA-200503-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml"
        },
        {
          "name": "ADV-2005-0240",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/0240"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=7152"
        },
        {
          "name": "ADV-2005-2565",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2565"
        },
        {
          "name": "oval:org.mitre.oval:def:10832",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832"
        },
        {
          "name": "17705",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17705"
        },
        {
          "name": "MDKSA-2005:064",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:064"
        },
        {
          "name": "RHSA-2005:300",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-300.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0664",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1013398",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013398"
            },
            {
              "name": "102041",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1"
            },
            {
              "name": "DSA-709",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-709"
            },
            {
              "name": "USN-91-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/91-1/"
            },
            {
              "name": "GLSA-200503-17",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml"
            },
            {
              "name": "ADV-2005-0240",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/0240"
            },
            {
              "name": "https://bugzilla.ubuntu.com/show_bug.cgi?id=7152",
              "refsource": "MISC",
              "url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=7152"
            },
            {
              "name": "ADV-2005-2565",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2565"
            },
            {
              "name": "oval:org.mitre.oval:def:10832",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832"
            },
            {
              "name": "17705",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17705"
            },
            {
              "name": "MDKSA-2005:064",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:064"
            },
            {
              "name": "RHSA-2005:300",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-300.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0664",
    "datePublished": "2005-03-08T05:00:00",
    "dateReserved": "2005-03-07T00:00:00",
    "dateUpdated": "2024-08-07T21:21:06.522Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag.
References
cve@mitre.orghttp://secunia.com/advisories/17705
cve@mitre.orghttp://securitytracker.com/id?1013398Patch
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-709Patch
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200503-17.xmlPatch
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:064
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-300.html
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/0240
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2565
cve@mitre.orghttps://bugzilla.ubuntu.com/show_bug.cgi?id=7152Patch
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832
cve@mitre.orghttps://usn.ubuntu.com/91-1/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17705
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1013398Patch
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-709Patch
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200503-17.xmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:064
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-300.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/0240
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2565
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.ubuntu.com/show_bug.cgi?id=7152Patch
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/91-1/
Impacted products
Vendor Product Version
libexif libexif 0.6.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D77F97-C618-43D2-B769-BBA0DBD0F441",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag."
    }
  ],
  "id": "CVE-2005-0664",
  "lastModified": "2024-11-20T23:55:38.923",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17705"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013398"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2005/dsa-709"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:064"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-300.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/0240"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2565"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=7152"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/91-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102041-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2005/dsa-709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:064"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-300.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/0240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.ubuntu.com/show_bug.cgi?id=7152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/91-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-14 21:19
Modified
2024-11-21 00:31
Severity ?
Summary
Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
References
cve@mitre.orghttp://osvdb.org/35978
cve@mitre.orghttp://secunia.com/advisories/25235Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25540
cve@mitre.orghttp://secunia.com/advisories/25569
cve@mitre.orghttp://secunia.com/advisories/25599
cve@mitre.orghttp://secunia.com/advisories/25621
cve@mitre.orghttp://secunia.com/advisories/25932
cve@mitre.orghttp://secunia.com/advisories/26083
cve@mitre.orghttp://secunia.com/advisories/28776
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200706-01.xml
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?release_id=507447Patch
cve@mitre.orghttp://sourceforge.net/tracker/index.php?func=detail&aid=1716196&group_id=12272&atid=112272
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1487
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:118
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_14_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_39_libexif.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/470502/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/23927Exploit, Patch
cve@mitre.orghttp://www.ubuntu.com/usn/usn-471-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1761
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/34233
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1431
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/35978
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25235Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25540
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25569
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25599
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25621
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25932
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26083
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28776
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200706-01.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=507447Patch
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/index.php?func=detail&aid=1716196&group_id=12272&atid=112272
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1487
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:118
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_14_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_39_libexif.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/470502/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23927Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-471-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1761
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/34233
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1431
Impacted products
Vendor Product Version
libexif libexif 0.5
libexif libexif 0.5.12
libexif libexif 0.6.9
libexif libexif 0.6.11
libexif libexif 0.6.12
libexif libexif 0.6.13



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E67B0-6E2C-4AAF-AA7B-AF7A91AF95C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "202E1115-B9F9-4518-A2C5-6069C0D75DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D77F97-C618-43D2-B769-BBA0DBD0F441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD998A8-F573-494D-8059-6E374526E8AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7751B3-A9FF-4D76-8C9D-CC92F17B66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F183B8-C095-4240-8807-73F6B38EE98C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n exif_data_load_data_entry en exif-data.c en libexif before 0.6.14 permite a atacantes con la intervenci\u00f3n del usuario provocar denegaci\u00f3n de servicio (caida) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de datos EXIF manipulados, afectando a las variables \r\n(1) doff o (2) s."
    }
  ],
  "id": "CVE-2007-2645",
  "lastModified": "2024-11-21T00:31:18.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-05-14T21:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35978"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25235"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25540"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25569"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25599"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25621"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25932"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28776"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200706-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=507447"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1716196\u0026group_id=12272\u0026atid=112272"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1487"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:118"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/470502/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/23927"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-471-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1761"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34233"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25540"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25569"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200706-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=507447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1716196\u0026group_id=12272\u0026atid=112272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/470502/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/23927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-471-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1431"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat does not consider this flaw to have security consequences.  For more details please see the following:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240055",
      "lastModified": "2007-05-24T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-20 02:46
Modified
2024-11-21 00:39
Severity ?
Summary
Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=202350
cve@mitre.orghttp://osvdb.org/42653
cve@mitre.orghttp://secunia.com/advisories/28076Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28127Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28195Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28266Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28346Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28400Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28636Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28776Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29381Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32274Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200712-15.xml
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1487
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:005
cve@mitre.orghttp://www.novell.com/linux/security/advisories/suse_security_summary_report.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-1165.htmlVendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-1166.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/485822/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/26942
cve@mitre.orghttp://www.securitytracker.com/id?1019124
cve@mitre.orghttp://www.ubuntu.com/usn/usn-654-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4278Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0947/referencesVendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=425561
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=425621
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=425631
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/39167
cve@mitre.orghttps://issues.rpath.com/browse/RPL-2068
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=202350
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42653
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28076Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28127Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28195Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28266Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28346Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28400Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28636Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28776Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29381Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32274Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200712-15.xml
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1487
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:005
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1165.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1166.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485822/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26942
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019124
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-654-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4278Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0947/referencesVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=425561
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=425621
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=425631
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39167
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-2068
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html
Impacted products
Vendor Product Version
libexif libexif *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libexif:libexif:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "603EE110-C330-4572-B080-CA82B7B353E9",
              "versionEndIncluding": "0.6.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de enteros en libexif versi\u00f3n 0.6.16 y anteriores, permite a los atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario por medio de una imagen con etiquetas EXIF especialmente dise\u00f1adas, lo que posiblemente involucra la funci\u00f3n exif_data_load_data_thumbnail en el archivo exif-data.c."
    }
  ],
  "id": "CVE-2007-6352",
  "lastModified": "2024-11-21T00:39:56.493",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-20T02:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=202350"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42653"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28076"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28127"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28195"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28266"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28346"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28400"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28636"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28776"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29381"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32274"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200712-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1487"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1165.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1166.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/485822/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26942"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-654-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4278"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0947/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425561"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425621"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425631"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39167"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-2068"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=202350"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200712-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-234701-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/suse_security_summary_report.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1165.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1166.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/485822/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-654-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/4278"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0947/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-2068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00626.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-06-14 19:30
Modified
2024-11-21 00:15
Severity ?
Summary
Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif before 0.6.16 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow.
References
cve@mitre.orghttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543Patch, Vendor Advisory
cve@mitre.orghttp://osvdb.org/35379
cve@mitre.orghttp://secunia.com/advisories/25642Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25645
cve@mitre.orghttp://secunia.com/advisories/25674
cve@mitre.orghttp://secunia.com/advisories/25717/
cve@mitre.orghttp://secunia.com/advisories/25746
cve@mitre.orghttp://secunia.com/advisories/25768
cve@mitre.orghttp://secunia.com/advisories/25820
cve@mitre.orghttp://secunia.com/advisories/25842
cve@mitre.orghttp://secunia.com/advisories/25932
cve@mitre.orghttp://secunia.com/advisories/26083
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200706-09.xml
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?release_id=515385Patch
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1310
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:128
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_14_sr.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_39_libexif.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/472046/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24461
cve@mitre.orghttp://www.securitytracker.com/id?1018240
cve@mitre.orghttp://www.ubuntu.com/usn/usn-478-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2165
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/34851
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1482
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2007-0501.html
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/35379
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25642Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25645
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25674
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25717/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25746
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25768
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25820
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25842
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25932
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26083
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200706-09.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=515385Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1310
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:128
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_14_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_39_libexif.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/472046/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24461
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018240
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-478-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2165
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/34851
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1482
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2007-0501.html
Impacted products
Vendor Product Version
libexif libexif 0.6.9
libexif libexif 0.6.11
libexif libexif 0.6.12
libexif libexif 0.6.13
libexif libexif 0.6.14
libexif libexif 0.6.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D77F97-C618-43D2-B769-BBA0DBD0F441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD998A8-F573-494D-8059-6E374526E8AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7751B3-A9FF-4D76-8C9D-CC92F17B66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F183B8-C095-4240-8807-73F6B38EE98C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "006A3051-2D2E-4271-82F4-682D54665880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libexif:libexif:0.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "758F45F3-03F9-4F01-9A7D-12B6B1C2F9D6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif before 0.6.16 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n exif_data_load_data_entry en libexif/exif-data.c en Libexif anterior a 0.6.16 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una imagen con diferentes componentes EXIF, lo cual dispara un desbordamiento de b\u00fafer basado en pila."
    }
  ],
  "id": "CVE-2006-4168",
  "lastModified": "2024-11-21T00:15:18.453",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-06-14T19:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35379"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25642"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25645"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25674"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25717/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25746"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25768"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25820"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25842"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25932"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200706-09.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=515385"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1310"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:128"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/472046/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24461"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018240"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-478-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2165"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34851"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1482"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://rhn.redhat.com/errata/RHSA-2007-0501.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25645"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25717/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25746"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200706-09.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=515385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_39_libexif.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/472046/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-478-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9349"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rhn.redhat.com/errata/RHSA-2007-0501.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}