First published: Sat Dec 31 2005(Updated: )
Buffer overflow in Andreas Huggel Exiv2 before 0.9 does not null terminate strings before calling the sscanf function, which allows remote attackers to cause a denial of service (application crash) via images with crafted IPTC metadata.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exiv2 | =0.6.1 | |
Exiv2 | =0.6 | |
Exiv2 | =0.4 | |
Exiv2 | =0.8 | |
Exiv2 | =0.5 | |
Exiv2 | =0.3 | |
Exiv2 | =0.7 | |
Exiv2 | =0.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4676 has a severity level classified as high due to the potential for denial of service attacks.
To fix CVE-2005-4676, upgrade to Exiv2 version 0.9 or later, which includes a patch for this vulnerability.
CVE-2005-4676 affects all versions of Exiv2 prior to 0.9.
Exploiting CVE-2005-4676 can lead to a denial of service by crashing the application with specially crafted images.
Yes, CVE-2005-4676 is related to file handling vulnerabilities in Exiv2 when processing IPTC metadata.