The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
References
Link Resource
http://advisories.mageia.org/MGASA-2013-0333.html Third Party Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html Broken Link
http://bugs.ghostscript.com/show_bug.cgi?id=686980 Issue Tracking Vendor Advisory
http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140852886808946&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140852974709252&w=2 Issue Tracking Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1803.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1804.html Third Party Advisory
http://secunia.com/advisories/56175 Not Applicable
http://secunia.com/advisories/58974 Not Applicable
http://secunia.com/advisories/59058 Not Applicable
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
http://support.apple.com/kb/HT6150 Third Party Advisory
http://support.apple.com/kb/HT6162 Third Party Advisory
http://support.apple.com/kb/HT6163 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 Broken Link
http://www.debian.org/security/2013/dsa-2799 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:273 Broken Link
http://www.mozilla.org/security/announce/2013/mfsa2013-116.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html Third Party Advisory
http://www.securityfocus.com/bid/63676 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029470 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029476 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2052-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2053-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2060-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0413 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0414 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=891693 Issue Tracking Patch Third Party Advisory
https://code.google.com/p/chromium/issues/detail?id=258723 Issue Tracking Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629 Patch Third Party Advisory
https://security.gentoo.org/glsa/201606-03 Third Party Advisory
https://src.chromium.org/viewvc/chrome?revision=229729&view=revision Patch Third Party Advisory
https://www.ibm.com/support/docview.wss?uid=swg21675973 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2013-11-15T20:00:00

Updated: 2018-01-04T19:57:01

Reserved: 2013-11-05T00:00:00


Link: CVE-2013-6629

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2013-11-19T04:50:56.250

Modified: 2023-06-21T18:19:38.313


Link: CVE-2013-6629

JSON object: View

cve-icon Redhat Information

No data.

CWE