CVE-2020-6625Out-of-bounds Read in Project Jhead

CWE-125Out-of-bounds Read9 documents6 sources
Severity
7.1HIGHNVD
OSV5.5
EPSS
0.6%
top 30.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9
Latest updateMay 23

Description

jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

Ubuntujhead_project/jhead< 1:3.00-8~ubuntu0.1+3
debiandebian/jhead

🔴Vulnerability Details

3
OSV
Jhead vulnerabilities2023-05-23
GHSA
GHSA-jpjw-8cq8-j6w9: jhead through 32022-05-24
OSV
CVE-2020-6625: jhead through 32020-01-09

📋Vendor Advisories

2
Ubuntu
Jhead vulnerabilities2023-05-23
Debian
CVE-2020-6625: jhead - jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ...2020

💬Community

3
Bugzilla
CVE-2020-6625 jhead: heap-based buffer overflow in Get32s when called from ProcessGpsInfo in gpsinfo.c [epel-all]2020-01-23
Bugzilla
CVE-2020-6625 jhead: heap-based buffer overflow in Get32s when called from ProcessGpsInfo in gpsinfo.c2020-01-23
Bugzilla
CVE-2020-6625 jhead: heap-based buffer overflow in Get32s when called from ProcessGpsInfo in gpsinfo.c [fedora-all]2020-01-23
CVE-2020-6625 — Out-of-bounds Read in Project Jhead | cvebase