First published: Fri Jul 13 2012(Updated: )
The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libexif12 | <=0.6.20 | |
SUSE Libexif12 | =0.6.14 | |
SUSE Libexif12 | =0.6.15 | |
SUSE Libexif12 | =0.6.16 | |
SUSE Libexif12 | =0.6.18 | |
SUSE Libexif12 | =0.6.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2812 is classified as a high severity vulnerability due to its potential to cause denial of service and expose sensitive information.
To fix CVE-2012-2812, you should upgrade libexif to version 0.6.21 or later.
CVE-2012-2812 includes vulnerabilities such as out-of-bounds read and potential information disclosure.
CVE-2012-2812 affects users of libexif versions prior to 0.6.21, specifically multiple versions including 0.6.14 to 0.6.20.
Yes, CVE-2012-2812 can be exploited remotely through crafted EXIF tags in an image.