*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: exiftags

References:
DSA-1533-1 (http://www.debian.org/security/2008/dsa-1533)

Quoting:
"Christian Schmid and Meder Kydyraliev (Google Security) discovered a
number of vulnerabilities in exiftags, a utility for extracting EXIF
metadata from JPEG images. The Common Vulnerabilities and Exposures
project identified the following three problems:

CVE-2007-6354

    Inadequate EXIF property validation could lead to invalid memory
    accesses if executed on a maliciously crafted image, potentially
    including heap corruption and the execution of arbitrary code.

CVE-2007-6355

    Flawed data validation could lead to integer overflows, causing
    other invalid memory accesses, also with the potential for memory
    corruption or arbitrary code execution.

CVE-2007-6356

    Cyclical EXIF image file directory (IFD) references could cause
    a denial of service (infinite loop)."

** Affects: exiftags (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-6354

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-6355

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-6356

-- 
[exiftags] [CVE-2007-6354, CVE-2007-6355, CVE-2007-6356] insufficient input 
sanitizing
https://bugs.launchpad.net/bugs/210159
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to