CVE-2020-26208Out-of-bounds Write in Project Jhead

Severity
6.1MEDIUMNVD
OSV5.5
EPSS
0.1%
top 74.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 2
Latest updateMay 23

Description

JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:HExploitability: 1.8 | Impact: 4.2

Affected Packages4 packages

debiandebian/jhead< jhead 1:3.04-6 (bookworm)
Debianjhead_project/jhead< 1:3.04-6+3
Ubuntujhead_project/jhead< 1:3.00-8~ubuntu0.1+3

Patches

🔴Vulnerability Details

2
OSV
Jhead vulnerabilities2023-05-23
OSV
CVE-2020-26208: JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras2022-02-02

📋Vendor Advisories

2
Ubuntu
Jhead vulnerabilities2023-05-23
Debian
CVE-2020-26208: jhead - JHEAD is a simple command line tool for displaying and some manipulation of EXIF...2020
CVE-2020-26208 — Out-of-bounds Write in Project Jhead | cvebase