libexif 缓冲区错误漏洞

admin 2024-01-14 23:53:55 YS 来源:ZONE.CI 全球网 0 阅读模式
> libexif 缓冲区错误漏洞

libexif 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-202005-1071 CVE编号 CVE-2020-13112
发布时间 2020-05-20 更新时间 2020-08-18
漏洞类型 缓冲区错误 漏洞来源 N/A
危险等级 超危 威胁类型 远程
厂商 N/A

漏洞介绍

libexif是一个使用C语言编写的函数库。该产品主要用于从图形文件中读写EXIF元信息。

libexif 0.6.22之前版本中EXIF MakerNote的处理过程存在缓冲区错误漏洞。攻击者可利用该漏洞导致信息泄露和拒绝服务(崩溃)。

漏洞补丁

目前厂商已发布升级了libexif 缓冲区错误漏洞的补丁,libexif 缓冲区错误漏洞的补丁获取链接:

参考网址

来源:GENTOO

链接:https://security.gentoo.org/glsa/202007-05

来源:MISC

链接:https://github.com/libexif/libexif/commit/435e21f05001fb03f9f186fa7cbc69454afd00d1

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/05/msg00025.html

来源:UBUNTU

链接:https://usn.ubuntu.com/4396-1/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158017/Red-Hat-Security-Advisory-2020-2474-01.html

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/47814

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2026/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2074/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158560/Gentoo-Linux-Security-Advisory-202007-05.html

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/libexif-three-vulnerabilities-32307

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2026.2/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158186/Red-Hat-Security-Advisory-2020-2672-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1888/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158040/Red-Hat-Security-Advisory-2020-2516-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158109/Ubuntu-Security-Notice-USN-4396-1.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-13112

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202005-1071

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0