jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251 | Exploit Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1679952 | Exploit Issue Tracking Third Party Advisory |
https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo | Mailing List Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WVQTORTGQE56XXC6OVHQCSCUGABRMQZ/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTGUHTJTQ6EKEPDXFSKZKVLUJC4UAPBQ/ | |
https://security.gentoo.org/glsa/202007-17 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: dwf
Published: 2019-07-15T17:10:56
Updated: 2020-07-27T01:06:31
Reserved: 2019-03-20T00:00:00
Link: CVE-2019-1010301
JSON object: View
NVD Information
Status : Modified
Published: 2019-07-15T18:15:11.883
Modified: 2023-11-07T03:02:19.073
Link: CVE-2019-1010301
JSON object: View
Redhat Information
No data.
CWE