2013-08-08

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can generate a buffer overflow in the Exposure correction code of LibRaw, in order to trigger a denial of service, and possibly to execute code.

Impacted products: Unix (platform)

Severity: 2/4

Creation date: 24/07/2013

DESCRIPTION OF THE VULNERABILITY

The LibRaw library implements a converter of images in RAW format.

The LibRaw::exp_bef() function of the src/libraw_cxx.cpp file corrects the exposure of a photography. However, if the size of data is greater than the size of the storage array, an overflow occurs.

An attacker can therefore generate a buffer overflow in the Exposure correction code of LibRaw, in order to trigger a denial of service, and possibly to execute code.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/L...

Show more