First published: Wed Aug 14 2013(Updated: )
Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
LibRaw | <=0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2127 is categorized as a moderate severity vulnerability due to its potential to cause denial of service and possibly allow remote code execution.
To fix CVE-2013-2127, upgrade LibRaw to version 0.15.1 or later.
CVE-2013-2127 affects LibRaw versions earlier than 0.15.1.
CVE-2013-2127 allows context-dependent attackers to crash the program or potentially execute arbitrary code.
Yes, CVE-2013-2127 involves a buffer overflow vulnerability in the exposure correction code of LibRaw.