Impact
libgphoto2 contains a buffer over‑read in the function ptp_unpack_EOS_FocusInfoEx that can be triggered by crafted data from an untrusted USB device, causing the library to read beyond allocated memory and crash. This results in a denial‑of‑service condition for any application that relies on libgphoto2, and could destabilise the host system if the crash propagates. The weakness is classified as CWE-126.
Affected Systems
The vulnerability affects the open‑source libgphoto2 camera access library, versions up to and including 2.5.33. Systems that use these versions to communicate with cameras over USB and receive data from potentially untrusted peripherals are at risk.
Risk and Exploitability
With a CVSS score of 3.5 the technical severity is low. The EPSS score is currently not available and the vulnerability is not listed in CISA’s KEV catalog, so the likelihood of widespread exploitation is limited. The most likely attack vector is a local attacker who can connect a malicious USB device to a system running libgphoto2; from there the attacker can supply malformed packets to induce the over‑read and force a crash. No attacker privileges beyond local USB access are required, and the flaw does not allow remote code execution.
OpenCVE Enrichment