Description
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
References
https://cwe.mitre.org/data/definitions/121.html
Third Party Advisory
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
ExploitIssue TrackingPatchThird Party Advisory
https://cwe.mitre.org/data/definitions/121.html
Third Party Advisory
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
ExploitIssue TrackingPatchThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-06-01T13:15:07.417Z
4 years agoLast modified
2024-11-21T04:08:19.537Z
1 year ago