First published: Wed Oct 31 2018(Updated: )
A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libexif Project Libexif | <0.6.22 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Debian Debian Linux | =8.0 | |
Google Android | ||
debian/libexif | 0.6.22-3 0.6.24-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-6328.
The severity of CVE-2016-6328 is high with a CVSS score of 8.1.
The affected software includes libexif versions up to and including 0.6.21-1ubuntu1+.
The potential impacts of CVE-2016-6328 include Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
You can find more information about CVE-2016-6328 at the following references: [1] [2] [3].