Vulnerabilities > CVE-2020-26208 - Out-of-bounds Write vulnerability in Jhead Project Jhead
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
HIGH Summary
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821
- https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4
- https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4
- https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc
- https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc
- https://github.com/Matthias-Wandel/jhead/issues/7
- https://github.com/Matthias-Wandel/jhead/issues/7