Debian Security Advisory
DSA-1474-1 exiv2 -- integer overflow
- Date Reported:
- 23 Jan 2008
- Affected Packages:
- exiv2
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-6353.
- More information:
-
Meder Kydyraliev discovered an integer overflow in the thumbnail handling of libexif, the EXIF/IPTC metadata manipulation library, which could result in the execution of arbitrary code.
The old stable distribution (sarge) doesn't contain exiv2 packages.
For the stable distribution (etch), this problem has been fixed in version 0.10-1.5.
We recommend that you upgrade your exiv2 packages.
- Fixed in:
-
Debian GNU/Linux 4.0 (stable)
- Source:
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5.diff.gz
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5.dsc
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10.orig.tar.gz
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5.dsc
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-doc_0.10-1.5_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_alpha.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_alpha.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_alpha.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_amd64.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_amd64.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_amd64.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_arm.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_arm.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_arm.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_hppa.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_hppa.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_hppa.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_i386.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_i386.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_i386.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_ia64.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_ia64.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_ia64.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_mips.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_mips.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_mips.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_mipsel.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_mipsel.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_mipsel.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_powerpc.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_powerpc.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_powerpc.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_s390.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_s390.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_s390.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-0.10_0.10-1.5_sparc.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_sparc.deb
- http://security.debian.org/pool/updates/main/e/exiv2/exiv2_0.10-1.5_sparc.deb
- http://security.debian.org/pool/updates/main/e/exiv2/libexiv2-dev_0.10-1.5_sparc.deb
MD5 checksums of the listed files are available in the original advisory.