First published: Fri Jul 13 2012(Updated: )
Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libexif Project Libexif | =0.6.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.