CVE-2007-2645
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/05/2007
Last modified:
09/04/2025
Description
Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:libexif:libexif:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libexif:libexif:0.5.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libexif:libexif:0.6.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libexif:libexif:0.6.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libexif:libexif:0.6.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:libexif:libexif:0.6.13:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/35978
- http://secunia.com/advisories/25235
- http://secunia.com/advisories/25540
- http://secunia.com/advisories/25569
- http://secunia.com/advisories/25599
- http://secunia.com/advisories/25621
- http://secunia.com/advisories/25932
- http://secunia.com/advisories/26083
- http://secunia.com/advisories/28776
- http://security.gentoo.org/glsa/glsa-200706-01.xml
- http://sourceforge.net/project/shownotes.php?release_id=507447
- http://sourceforge.net/tracker/index.php?func=detail&aid=1716196&group_id=12272&atid=112272
- http://www.debian.org/security/2008/dsa-1487
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A118
- http://www.novell.com/linux/security/advisories/2007_14_sr.html
- http://www.novell.com/linux/security/advisories/2007_39_libexif.html
- http://www.securityfocus.com/archive/1/470502/100/100/threaded
- http://www.securityfocus.com/bid/23927
- http://www.ubuntu.com/usn/usn-471-1
- http://www.vupen.com/english/advisories/2007/1761
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34233
- https://issues.rpath.com/browse/RPL-1431
- http://osvdb.org/35978
- http://secunia.com/advisories/25235
- http://secunia.com/advisories/25540
- http://secunia.com/advisories/25569
- http://secunia.com/advisories/25599
- http://secunia.com/advisories/25621
- http://secunia.com/advisories/25932
- http://secunia.com/advisories/26083
- http://secunia.com/advisories/28776
- http://security.gentoo.org/glsa/glsa-200706-01.xml
- http://sourceforge.net/project/shownotes.php?release_id=507447
- http://sourceforge.net/tracker/index.php?func=detail&aid=1716196&group_id=12272&atid=112272
- http://www.debian.org/security/2008/dsa-1487
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A118
- http://www.novell.com/linux/security/advisories/2007_14_sr.html
- http://www.novell.com/linux/security/advisories/2007_39_libexif.html
- http://www.securityfocus.com/archive/1/470502/100/100/threaded
- http://www.securityfocus.com/bid/23927
- http://www.ubuntu.com/usn/usn-471-1
- http://www.vupen.com/english/advisories/2007/1761
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34233
- https://issues.rpath.com/browse/RPL-1431



