*** This bug is a security vulnerability *** Public security bug reported:
Binary package hint: exiftags References: DSA-1533-1 (http://www.debian.org/security/2008/dsa-1533) Quoting: "Christian Schmid and Meder Kydyraliev (Google Security) discovered a number of vulnerabilities in exiftags, a utility for extracting EXIF metadata from JPEG images. The Common Vulnerabilities and Exposures project identified the following three problems: CVE-2007-6354 Inadequate EXIF property validation could lead to invalid memory accesses if executed on a maliciously crafted image, potentially including heap corruption and the execution of arbitrary code. CVE-2007-6355 Flawed data validation could lead to integer overflows, causing other invalid memory accesses, also with the potential for memory corruption or arbitrary code execution. CVE-2007-6356 Cyclical EXIF image file directory (IFD) references could cause a denial of service (infinite loop)." ** Affects: exiftags (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-6354 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-6355 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-6356 -- [exiftags] [CVE-2007-6354, CVE-2007-6355, CVE-2007-6356] insufficient input sanitizing https://bugs.launchpad.net/bugs/210159 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs