Vulnerability Description
libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libexif Project | Libexif | <= 0.6.21 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html
- https://sourceforge.net/p/libexif/bugs/130/ExploitThird Party Advisory
- https://usn.ubuntu.com/4277-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00016.html
- https://sourceforge.net/p/libexif/bugs/130/ExploitThird Party Advisory
- https://usn.ubuntu.com/4277-1/
FAQ
What is CVE-2017-7544?
CVE-2017-7544 is a vulnerability with a CVSS score of 9.1 (CRITICAL). libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data o...
How severe is CVE-2017-7544?
CVE-2017-7544 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7544?
Check the references section above for vendor advisories and patch information. Affected products include: Libexif Project Libexif.