jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1679952 | Exploit Issue Tracking Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251 | Exploit Third Party Advisory |
https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo | Mailing List Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WVQTORTGQE56XXC6OVHQCSCUGABRMQZ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGUHTJTQ6EKEPDXFSKZKVLUJC4UAPBQ/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202007-17 | Third Party Advisory |
Information
Published : 2019-07-15 11:15
Updated : 2022-04-26 13:17
NVD link : CVE-2019-1010301
Mitre link : CVE-2019-1010301
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
jhead_project
- jhead
fedoraproject
- fedora