CERTA-2005-AVI-105
Vulnerability from certfr_avis - Published: 2005-03-11 - Updated: 2005-11-24None
Description
La bibliothèque libexif est utilisée pour interpréter les fichiers image au format EXIF.
Une vulnérabilité de type débordement de mémoire permet à un utilisateur mal intentionné d'avoir un accès au système vulnérable ou d'effectuer un déni de service à distance sur n'importe quelle application utilisant la bibliothèque libexif,
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Toutes les versions antérieures à libexif 0.6.10_1.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eToutes les versions ant\u00e9rieures \u00e0 libexif 0.6.10_1.\u003c/P\u003e",
"content": "## Description\n\nLa biblioth\u00e8que libexif est utilis\u00e9e pour interpr\u00e9ter les fichiers image\nau format EXIF.\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire permet \u00e0 un utilisateur\nmal intentionn\u00e9 d\u0027avoir un acc\u00e8s au syst\u00e8me vuln\u00e9rable ou d\u0027effectuer un\nd\u00e9ni de service \u00e0 distance sur n\u0027importe quelle application utilisant la\nbiblioth\u00e8que libexif,\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-03-11T00:00:00",
"last_revision_date": "2005-11-24T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:064 du 31 mars 2005 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:064"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenBSD du 13 mars 2005 pour libexif :",
"url": "http://www.vuxml.org/openbsd"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-709 du 15 avril 2005 :",
"url": "http://www.debian.org/security/2005/dsa-709"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200503-17 du 12 mars 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-17.xml"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Fedora Core 3 du 8 mars 2005 :",
"url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"
},
{
"title": "BUlletin de s\u00e9curit\u00e9 Red Hat RHSA-2005:300 du 21 mars 2005 :",
"url": "https://rhn.redhat.com/errata/RHSA-2005-300.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Sun #102041 du 23 novembre 2005 :",
"url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102041-1"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Fedora Core 2 du 8 mars 2005 :",
"url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/"
}
],
"reference": "CERTA-2005-AVI-105",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-03-11T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 de Gentoo.",
"revision_date": "2005-03-17T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 OpenBSD et RedHat RHSA-2005:300.",
"revision_date": "2005-03-24T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandrake.",
"revision_date": "2005-04-01T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2005-04-18T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Sun #102041.",
"revision_date": "2005-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Acc\u00e8s au syst\u00e8me"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de libexif",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD du 08 mars 2005",
"url": "http://www.vuxml.org/freebsd/pkg-libexif.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…