This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in the Exposure correction code of LibRaw, in order to trigger a denial of service, and possibly to execute code.
Impacted products: Unix (platform)
Severity: 2/4
Creation date: 24/07/2013
DESCRIPTION OF THE VULNERABILITY
The LibRaw library implements a converter of images in RAW format.
The LibRaw::exp_bef() function of the src/libraw_cxx.cpp file corrects the exposure of a photography. However, if the size of data is greater than the size of the storage array, an overflow occurs.
An attacker can therefore generate a buffer overflow in the Exposure correction code of LibRaw, in order to trigger a denial of service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/L...