Highly critical

Google Picasa RAW Image Parsing Multiple Vulnerabilities

-

Release Date:  2013-12-20    Views:  6,354

Secunia Advisory SA55555

Where:

You need to log in to view this

Impact:

You need to log in to view this

Solution Status:

You need to log in to view this

Software:

You need to log in to view this

CVE Reference(s):

You need to log in to view this

Description


Secunia Research has discovered multiple vulnerabilities in Google Picasa, which can be exploited by malicious people to compromise a user's system


You need to log in to the Secunia Community to view the full description of this advisory

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Google Picasa RAW Image Parsing Multiple Vulnerabilities

User Message
Yossarian RE: Google Picasa RAW Image Parsing Multiple Vulnerabilities
Member 31st Dec, 2013 12:43
Score: 3
Posts: 4
User Since: 27th Nov 2010
System Score: 97%
Location: UK
Last edited on 31st Dec, 2013 12:43
The solution given here seems to apply only to Apple Macs.

--
Yossarian
Where was that stooped and mealy-colored old man I used to call poppa when the merry-go-round broke down?
Was this reply relevant?
+0
-0
Maurice Joyce RE: Google Picasa RAW Image Parsing Multiple Vulnerabilities
Handling Contributor 31st Dec, 2013 13:52
Score: 11919
Posts: 9,131
User Since: 4th Jan 2009
System Score: N/A
Location: UK
Last edited on 2nd Jan, 2014 10:07
You are not reading the advisory correctly.

https://secunia.com/advisories/55555

Google solution for Windows is here:

https://1ncuig.bn1.livefilestore.com/y2pFB9nD0UGei...

--
Maurice

Windows 7 SP1 64 Bit OS
HP Intel Pentium i7
IE 11 for Windows 7 SP1
16GB RAM
Was this reply relevant?
+2
-0

-

You must be logged in to post a comment.