Heap-based buffer overflow in libexif - CVE-2009-3895
Published: July 26, 2020
libexif
libexif.sourceforge.net
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif. A remote attacker can create a specially crafted imgae, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://bugs.debian.org/557137
- http://bugs.gentoo.org/show_bug.cgi?id=293190
- http://libexif.cvs.sourceforge.net/viewvc/libexif/libexif/NEWS?view=markup&pathrev=libexif-0_6_19-release
- http://secunia.com/advisories/37378
- http://sourceforge.net/mailarchive/message.php?msg_name=20091113072359.GA22681%40coneharvesters.com
- http://www.openwall.com/lists/oss-security/2009/11/19/2
- http://www.osvdb.org/59956
- http://www.securityfocus.com/bid/37022
- http://www.vupen.com/english/advisories/2009/3243
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54275