Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an image with a crafted EXIF tag. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664 https://bugzilla.redhat.com/beta/show_bug.cgi?id=150503 https://bugzilla.ubuntulinux.org/show_bug.cgi?id=7152 ------- Additional Comments From marcdeslauriers 2005-03-10 16:07:19 ---- Whoops...no libexif in our stuff... ------- Bug moved to this database by dkl 2005-03-30 18:32 ------- This bug previously known as bug 2452 at https://bugzilla.fedora.us/ https://bugzilla.fedora.us/show_bug.cgi?id=2452 Originally filed under the Fedora Legacy product and Package request component. Unknown priority P2. Setting to default priority "normal". Unknown platform PC. Setting to default platform "All". Setting qa contact to the default for this product. This bug either had no qa contact or an invalid one.