SB2012071805 - Slackware Linux update for libexif
Published: July 18, 2012 Updated: May 6, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2012-2812)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
2) Out-of-bounds read (CVE-ID: CVE-2012-2813)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
3) Buffer overflow (CVE-ID: CVE-2012-2814)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing images in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create crafted EXIF tags in an image, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Out-of-bounds read (CVE-ID: CVE-2012-2836)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library. A remote attacker can create specially crafted EXIF tags in an image, trigger out-of-bounds read error and read contents of memory on the system.
5) Division by zero (CVE-ID: CVE-2012-2837)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to divide-by-zero error within the mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library. A remote attacker can perform a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
6) Off-by-one (CVE-ID: CVE-2012-2840)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can trigger an off-by-one error via crafted EXIF tags in an image and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Integer underflow (CVE-ID: CVE-2012-2841)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library. A remote attacker can create a specially crafted file and execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
8) Out-of-bounds read (CVE-ID: CVE-2012-2845)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20. A remote attacker can perform a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file.
Remediation
Install update from vendor's website.