CVE-2013-6629

The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
References
Link Resource
http://advisories.mageia.org/MGASA-2013-0333.html Third Party Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html Broken Link
http://bugs.ghostscript.com/show_bug.cgi?id=686980 Issue Tracking Vendor Advisory
http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140852886808946&w=2 Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140852974709252&w=2 Issue Tracking Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1803.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1804.html Third Party Advisory
http://secunia.com/advisories/56175 Not Applicable
http://secunia.com/advisories/58974 Not Applicable
http://secunia.com/advisories/59058 Not Applicable
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
http://support.apple.com/kb/HT6150 Third Party Advisory
http://support.apple.com/kb/HT6162 Third Party Advisory
http://support.apple.com/kb/HT6163 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 Broken Link
http://www.debian.org/security/2013/dsa-2799 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:273 Broken Link
http://www.mozilla.org/security/announce/2013/mfsa2013-116.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html Third Party Advisory
http://www.securityfocus.com/bid/63676 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029470 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029476 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2052-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2053-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2060-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0413 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:0414 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=891693 Issue Tracking Patch Third Party Advisory
https://code.google.com/p/chromium/issues/detail?id=258723 Issue Tracking Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629 Patch Third Party Advisory
https://security.gentoo.org/glsa/201606-03 Third Party Advisory
https://src.chromium.org/viewvc/chrome?revision=229729&view=revision Patch Third Party Advisory
https://www.ibm.com/support/docview.wss?uid=swg21675973 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-11-19 04:50

Updated : 2024-02-04 18:16


NVD link : CVE-2013-6629

Mitre link : CVE-2013-6629

CVE.ORG link : CVE-2013-6629


JSON object : View

Products Affected

debian

  • debian_linux

mozilla

  • seamonkey
  • firefox_esr
  • thunderbird
  • firefox

opensuse

  • opensuse

libjpeg-turbo

  • libjpeg-turbo

canonical

  • ubuntu_linux

artifex

  • gpl_ghostscript

google

  • chrome

fedoraproject

  • fedora

oracle

  • solaris
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor