Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в libjpeg
дополнено с 26 ноября 2013 г.
Опубликовано:9 декабря 2013 г.
Источник:
SecurityVulns ID:13427
Тип:библиотека
Уровень опасности:
7/10
Описание:Переполнение буфера, обращение к неинициализированной памяти.
Затронутые продукты:LIBJPEG : libjpeg-turbo 1.3
CVE:CVE-2013-6630 (The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.)
 CVE-2013-6629 (The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.)
 CVE-2012-2806 (Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image.)
Оригинальный текстdocumentMichal Zalewski, bugs in IJG jpeg6b & libjpeg-turbo (09.12.2013)
 documentMANDRIVA, [ MDVSA-2013:274 ] libjpeg (26.11.2013)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород