Multiple vulnerabilities in libexif



Published: 2012-07-13 | Updated: 2020-07-26
Risk High
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2012-2812
CVE-2012-2813
CVE-2012-2814
CVE-2012-2836
CVE-2012-2837
CVE-2012-2840
CVE-2012-2841
CVE-2012-2845
CWE-ID CWE-125
CWE-119
CWE-369
CWE-193
CWE-191
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
libexif
Universal components / Libraries / Libraries used by multiple products

Vendor libexif.sourceforge.net

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU31853

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2812

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-1255.html
http://secunia.com/advisories/49988
http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.debian.org/security/2012/dsa-2559
http://www.securityfocus.com/bid/54437
http://www.ubuntu.com/usn/USN-1513-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU31852

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2813

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-1255.html
http://secunia.com/advisories/49988
http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.debian.org/security/2012/dsa-2559
http://www.securityfocus.com/bid/54437
http://www.ubuntu.com/usn/USN-1513-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU1477

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2814

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing images in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create crafted EXIF tags in an image, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://sourceforge.net/mailarchive/message.php?msg_id=29534027


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU31851

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2836

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library. A remote attacker can create specially crafted EXIF tags in an image,  trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-1255.html
http://secunia.com/advisories/49988
http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.debian.org/security/2012/dsa-2559
http://www.securityfocus.com/bid/54437
http://www.ubuntu.com/usn/USN-1513-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Division by zero

EUVDB-ID: #VU31850

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2837

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to divide-by-zero error within the mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library. A remote attacker can perform a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-1255.html
http://secunia.com/advisories/49988
http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.debian.org/security/2012/dsa-2559
http://www.securityfocus.com/bid/54437
http://www.ubuntu.com/usn/USN-1513-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Off-by-one

EUVDB-ID: #VU31849

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2840

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to an off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can trigger an off-by-one error via crafted EXIF tags in an image and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-1255.html
http://secunia.com/advisories/49988
http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.debian.org/security/2012/dsa-2559
http://www.securityfocus.com/bid/54437
http://www.ubuntu.com/usn/USN-1513-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer underflow

EUVDB-ID: #VU31848

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2841

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create a specially crafted file and execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
http://rhn.redhat.com/errata/RHSA-2012-1255.html
http://secunia.com/advisories/49988
http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.debian.org/security/2012/dsa-2559
http://www.securityfocus.com/bid/54437
http://www.ubuntu.com/usn/USN-1513-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU31847

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-2845

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20. A remote attacker can perform a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libexif: 0.6.9 - 0.6.20

External links

http://sourceforge.net/mailarchive/message.php?msg_id=29534027
http://www.mandriva.com/security/advisories?name=MDVSA-2012:107
http://www.securityfocus.com/bid/54437


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###