Integer underflow in Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 allows remote attackers to execute arbitrary code via a crafted JPEG tag that triggers a heap-based buffer overflow, as demonstrated using a Canon RAW CR2 file with a large JPEG tag value and a small size.
References
Link | Resource |
---|---|
http://secunia.com/advisories/55555 | Vendor Advisory |
http://secunia.com/secunia_research/2013-14/ | Vendor Advisory |
http://www.securitytracker.com/id/1029527 | |
https://support.google.com/picasa/answer/53209 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2014-01-09 00:55
Updated : 2024-02-04 18:16
NVD link : CVE-2013-5349
Mitre link : CVE-2013-5349
CVE.ORG link : CVE-2013-5349
JSON object : View
Products Affected
- picasa
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer