Integer underflow in Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 allows remote attackers to execute arbitrary code via a crafted JPEG tag that triggers a heap-based buffer overflow, as demonstrated using a Canon RAW CR2 file with a large JPEG tag value and a small size.
References
Link | Resource |
---|---|
http://secunia.com/secunia_research/2013-14/ | Vendor Advisory |
https://support.google.com/picasa/answer/53209 | Vendor Advisory |
http://secunia.com/advisories/55555 | Vendor Advisory |
http://www.securitytracker.com/id/1029527 |
Configurations
Information
Published : 2014-01-08 16:55
Updated : 2014-04-25 06:38
NVD link : CVE-2013-5349
Mitre link : CVE-2013-5349
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
- picasa