jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1679952 | issue tracking exploit third party advisory |
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251 | third party advisory exploit |
https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo | mailing list third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WVQTORTGQE56XXC6OVHQCSCUGABRMQZ/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTGUHTJTQ6EKEPDXFSKZKVLUJC4UAPBQ/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202007-17 | third party advisory vendor advisory |