CVE-2020-26208

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-26208
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26208.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26208
Aliases
  • GHSA-7pr6-xq4f-qhgc
Related
Published
2022-02-02T12:15:07Z
Modified
2024-08-01T08:56:58.569477Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H CVSS Calculator
Summary
[none]
Details

JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.

References

Affected packages

Debian:11 / jhead

Package

Name
jhead
Purl
pkg:deb/debian/jhead?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.04-6

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / jhead

Package

Name
jhead
Purl
pkg:deb/debian/jhead?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.04-6

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / jhead

Package

Name
jhead
Purl
pkg:deb/debian/jhead?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.04-6

Ecosystem specific

{
    "urgency": "unimportant"
}