First published: Fri Nov 20 2009(Updated: )
Heap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libexif12 | =0.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3895 is classified as a high severity vulnerability due to its potential for remote code execution and denial of service.
To mitigate CVE-2009-3895, you should upgrade to a patched version of libexif, specifically any version higher than 0.6.18.
CVE-2009-3895 can be exploited to perform denial of service attacks or execute arbitrary code via malicious EXIF images.
The affected version of libexif by CVE-2009-3895 is 0.6.18.
CVE-2009-3895 is particularly relevant for applications using libexif 0.6.18, regardless of the operating system.