CVE-2020-6624Out-of-bounds Read in Project Jhead

CWE-125Out-of-bounds Read9 documents6 sources
Severity
7.1HIGHNVD
OSV5.5
EPSS
0.7%
top 27.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9
Latest updateMay 23

Description

jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

Ubuntujhead_project/jhead< 1:3.00-8~ubuntu0.1+3
debiandebian/jhead

🔴Vulnerability Details

3
OSV
Jhead vulnerabilities2023-05-23
GHSA
GHSA-2w8m-f4xv-fpww: jhead through 32022-05-24
OSV
CVE-2020-6624: jhead through 32020-01-09

📋Vendor Advisories

2
Ubuntu
Jhead vulnerabilities2023-05-23
Debian
CVE-2020-6624: jhead - jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess...2020

💬Community

3
Bugzilla
CVE-2020-6624 jhead: heap-based buffer overflow in process_DQT in jpgqguess.c [epel-all]2020-01-23
Bugzilla
CVE-2020-6624 jhead: heap-based buffer overflow in process_DQT in jpgqguess.c [fedora-all]2020-01-23
Bugzilla
CVE-2020-6624 jhead: heap-based buffer overflow in process_DQT in jpgqguess.c2020-01-23
CVE-2020-6624 — Out-of-bounds Read in Project Jhead | cvebase