Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libexif | Libexif_project | 0.6.20 (including) | 0.6.20 (including) |
Red Hat Enterprise Linux 5 | RedHat | libexif-0:0.6.21-1.el5_8 | * |
Red Hat Enterprise Linux 6 | RedHat | libexif-0:0.6.21-5.el6_3 | * |
Libexif | Ubuntu | hardy | * |
Libexif | Ubuntu | lucid | * |
Libexif | Ubuntu | natty | * |
Libexif | Ubuntu | oneiric | * |
Libexif | Ubuntu | precise | * |
Libexif | Ubuntu | upstream | * |