Description
libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow.
Published: 2026-03-16
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Buffer Overwrite
Action: Patch
AI Analysis

Impact

The vulnerability exists in libexif version 0.6.25 and earlier during MakerNotes decoding. If the function exif_mnote_data_get_value receives a size of zero, an integer underflow occurs, allowing a caller‑supplied buffer to be overwritten. Key detail from vendor description: "If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in‑buffer would be overwritten due to an integer underflow." This weakness is identified as CWE‑191 and can lead to memory corruption. Based on the description, it is inferred that an attacker who can control EXIF data may trigger the overwrite, potentially enabling arbitrary code execution if the corruption affects executable code. The primary impact is therefore a buffer overwrite that could compromise confidentiality, integrity, or availability of the affected process.

Affected Systems

The affected product is the libexif library, version 0.6.25 and all earlier releases. Any application or system that incorporates libexif 0.6.25 or older is vulnerable. This includes software that parses EXIF metadata from images or other media files. The vulnerability is not limited to any specific vendor; it applies to all distributions of libexif up to the stated version.

Risk and Exploitability

The CVSS score is 7.4, indicating a high severity. The EPSS score is below 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to be local or remote via the injection of malicious EXIF data, such as by uploading a crafted image file. Exploitation requires providing the vulnerable input to a component that decodes MakerNotes, so the threat is greatest for software that accepts user‑supplied images without validating or sanitizing EXIF information.

Generated by OpenCVE AI on March 17, 2026 at 01:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update libexif to a release newer than 0.6.25.

Generated by OpenCVE AI on March 17, 2026 at 01:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Libexif
Libexif libexif
Vendors & Products Libexif
Libexif libexif

Tue, 17 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Title libexif: libexif: Buffer overwrite via integer underflow in MakerNotes decoding
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 16 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow.
Weaknesses CWE-191
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-17T12:53:49.253Z

Reserved: 2026-03-16T06:31:35.564Z

Link: CVE-2026-32775

cve-icon Vulnrichment

Updated: 2026-03-16T13:45:44.480Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:44.413

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-32775

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-16T06:31:36Z

Links: CVE-2026-32775 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:44Z

Weaknesses