Vulnerability identifier: #VU31850
Vulnerability risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-369
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
libexif
Universal components / Libraries /
Libraries used by multiple products
Vendor: libexif.sourceforge.net
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to divide-by-zero error within the mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library. A remote attacker can perform a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
Mitigation
Install update from vendor's website.
Vulnerable software versions
libexif: 0.6.9 - 0.6.20
External links
https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html
https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html
https://rhn.redhat.com/errata/RHSA-2012-1255.html
https://secunia.com/advisories/49988
https://sourceforge.net/mailarchive/message.php?msg_id=29534027
https://www.debian.org/security/2012/dsa-2559
https://www.securityfocus.com/bid/54437
https://www.ubuntu.com/usn/USN-1513-1
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.