----------  Forwarded Message  ----------

Subject: Bug#786785: exactimage: CVE-2015-3885: input sanitization flaw 
leading to buffer overflow
Date: Monday 25 May 2015, 17:00:43
From: Salvatore Bonaccorso <[email protected]>
To: [email protected]

Source: exactimage
Version: 0.8.5-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for exactimage.

CVE-2015-3885[0]:
| Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier
| allows remote attackers to cause a denial of service (crash) via a
| crafted image, which triggers a buffer overflow, related to the len
| variable.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3885
[1] http://www.ocert.org/advisories/ocert-2015-006.html

Regards,
Salvatore
-----------------------------------------

Attachment: signature.asc
Description: This is a digitally signed message part.

----------------------------------------------------------- 
If you wish to unsubscribe from this mailing, send mail to
[email protected] with a subject of: unsubscribe exact-image

Reply via email to