Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1533-2 (exiftags)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing an update to exiftags announced via advisory DSA 1533-2.

Insight

Insight

Christian Schmid and Meder Kydyraliev (Google Security) discovered a number of vulnerabilities in exiftags, a utility for extracting EXIF metadata from JPEG images. This update merely adds the packages for Debian 3.1 sarge (oldstable) which were missing in the previous DSA. The Common Vulnerabilities and Exposures project identified the following three problems: CVE-2007-6354 Inadequate EXIF property validation could lead to invalid memory accesses if executed on a maliciously crafted image, potentially including heap corruption and the execution of arbitrary code. CVE-2007-6355 Flawed data validation could lead to integer overflows, causing other invalid memory accesses, also with the potential for memory corruption or arbitrary code execution. CVE-2007-6356 Cyclical EXIF image file directory (IFD) references could cause a denial of service (infinite loop). For the stable distribution (etch), these problems have been fixed in version 0.98-1.1+etch1. For the oldstable distribution (sarge), these problems have been fixed in version 0.98-1.1+0sarge1. For the unstable distribution (sid), these problems have been fixed in version 1.01-0.1.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201533-2

Common Vulnerabilities and Exposures (CVE)