Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead version 3.04, allows local attackers to execute arbitrary code and cause a denial of service (DoS).
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 | Exploit Issue Tracking |
https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2 | Exploit |
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da | Patch |
https://github.com/Matthias-Wandel/jhead/issues/8 | Exploit Issue Tracking Patch |
Configurations
History
No history.
Information
Published : 2023-08-11 14:15
Updated : 2023-08-21 17:17
NVD link : CVE-2020-28840
Mitre link : CVE-2020-28840
CVE.ORG link : CVE-2020-28840
JSON object : View
Products Affected
matthiaswandel
- jhead
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')