The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
No history.
Information
Published : 2013-11-19 04:50
Updated : 2024-02-04 18:16
NVD link : CVE-2013-6629
Mitre link : CVE-2013-6629
CVE.ORG link : CVE-2013-6629
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- seamonkey
- firefox_esr
- thunderbird
- firefox
opensuse
- opensuse
libjpeg-turbo
- libjpeg-turbo
canonical
- ubuntu_linux
artifex
- gpl_ghostscript
- chrome
fedoraproject
- fedora
oracle
- solaris
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor