First published: Fri Jul 13 2012(Updated: )
The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libexif12 | <=0.6.20 | |
SUSE Libexif12 | =0.6.14 | |
SUSE Libexif12 | =0.6.15 | |
SUSE Libexif12 | =0.6.16 | |
SUSE Libexif12 | =0.6.18 | |
SUSE Libexif12 | =0.6.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2836 has a moderate severity rating due to its potential to cause denial of service and expose sensitive information.
To fix CVE-2012-2836, update the EXIF Tag Parsing Library (libexif) to version 0.6.21 or later.
CVE-2012-2836 introduces vulnerabilities that can lead to out-of-bounds read errors and possible exposure of sensitive memory information.
CVE-2012-2836 affects libexif versions 0.6.20 and earlier.
Yes, CVE-2012-2836 can be exploited remotely by sending crafted EXIF tags in an image.