Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead version 3.04, allows local attackers to execute arbitrary code and cause a denial of service (DoS).
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 | Exploit Issue Tracking |
https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2 | Exploit |
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da | Patch |
https://github.com/Matthias-Wandel/jhead/issues/8 | Exploit Issue Tracking Patch |
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 | Exploit Issue Tracking |
https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2 | Exploit |
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da | Patch |
https://github.com/Matthias-Wandel/jhead/issues/8 | Exploit Issue Tracking Patch |
Configurations
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 - Exploit, Issue Tracking | |
References | () https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2 - Exploit | |
References | () https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da - Patch | |
References | () https://github.com/Matthias-Wandel/jhead/issues/8 - Exploit, Issue Tracking, Patch |
Information
Published : 2023-08-11 14:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-28840
Mitre link : CVE-2020-28840
CVE.ORG link : CVE-2020-28840
JSON object : View
Products Affected
matthiaswandel
- jhead
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')