Impact
An out‑of‑bounds read exists in libgphoto2’s ptp_unpack_DPV() function when handling UINT128 and INT128 values. The function advances the read offset by 16 bytes without confirming that the buffer contains that many bytes, potentially exposing up to 15 bytes of adjacent memory. This vulnerability could allow an attacker to read sensitive data from the process’s address space, but it does not provide any form of code execution or privilege escalation.
Affected Systems
The flaw affects gphoto:libgphoto2 versions up to and including 2.5.33. Any application that processes data from cameras or PTP-compatible devices using this library is potentially impacted. No other product or version information is available in the advisory.
Risk and Exploitability
The CVSS score of 5.2 indicates a moderate impact, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalogue. The likely attack vector requires an attacker to supply crafted data to a camera or PTP device that the library parses, which is typically a trusted device. Successful exploitation would result in information disclosure, not remote code execution.
OpenCVE Enrichment