Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.
References
Link | Resource |
---|---|
https://github.com/Matthias-Wandel/jhead/commit/64894dbc7d8e1e232e85f1cab25c64290b2fc167 | Patch |
https://github.com/Matthias-Wandel/jhead/issues/51 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-13 20:15
Updated : 2023-06-23 20:10
NVD link : CVE-2022-28550
Mitre link : CVE-2022-28550
CVE.ORG link : CVE-2022-28550
JSON object : View
Products Affected
jhead_project
- jhead
CWE
CWE-787
Out-of-bounds Write