CVE-2024-2824

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-2824
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-2824.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-2824
Related
Published
2024-03-22T18:15:08Z
Modified
2025-01-14T11:53:33.229791Z
Summary
[none]
Details

A vulnerability was found in Matthias-Wandel jhead 3.08 and classified as critical. This issue affects the function PrintFormatNumber of the file exif.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257711.

References

Affected packages

Debian:11 / jhead

Package

Name
jhead
Purl
pkg:deb/debian/jhead?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:3.*

1:3.04-6
1:3.04-6+deb11u1
1:3.06.0.1-1
1:3.06.0.1-2
1:3.06.0.1-3
1:3.06.0.1-4
1:3.06.0.1-5
1:3.06.0.1-6
1:3.08-1
1:3.08-2
1:3.08-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / jhead

Package

Name
jhead
Purl
pkg:deb/debian/jhead?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:3.*

1:3.06.0.1-6
1:3.08-1
1:3.08-2
1:3.08-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / jhead

Package

Name
jhead
Purl
pkg:deb/debian/jhead?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:3.*

1:3.06.0.1-6
1:3.08-1
1:3.08-2
1:3.08-3

Ecosystem specific

{
    "urgency": "unimportant"
}