CVE-2020-26208

Source
https://cve.org/CVERecord?id=CVE-2020-26208
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26208.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26208
Downstream
Related
  • GHSA-7pr6-xq4f-qhgc
Published
2022-02-02T12:15:07.783Z
Modified
2026-03-14T14:45:54.314998Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H CVSS Calculator
Summary
[none]
Details

JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.

References

Affected packages

Git / github.com/fstark-prog/jhead

Affected ranges

Type
GIT
Repo
https://github.com/fstark-prog/jhead
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/fstark-prog/jhead
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "3.04"
            }
        ]
    }
]
vanir_signatures
[
    {
        "signature_type": "Function",
        "deprecated": false,
        "id": "CVE-2020-26208-9cc15307",
        "target": {
            "file": "jpgfile.c",
            "function": "ReadJpegSections"
        },
        "digest": {
            "length": 4468.0,
            "function_hash": "169859494957838646546167816554253108203"
        },
        "signature_version": "v1",
        "source": "https://github.com/fstark-prog/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2020-26208-9f1f6a1b",
        "target": {
            "file": "jpgfile.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "330576998942771320151481250915304193446",
                "40248117166146344862024078462565820385",
                "323429446749629407972037523201053216423",
                "56402429679977452765806517496243227448",
                "187911260753655467679865722206949584709",
                "301837814040836008224752105503415912204",
                "119770356065684445666760556539337173884",
                "293215338876584511415204784118399240843"
            ]
        },
        "signature_version": "v1",
        "source": "https://github.com/fstark-prog/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26208.json"