Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown
CVE-2022-28550
Disclosure Date: June 13, 2023 (last updated October 08, 2023)
Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.
0
Attacker Value
Unknown
CVE-2021-34055
Disclosure Date: November 04, 2022 (last updated February 24, 2025)
jhead 3.06 is vulnerable to Buffer Overflow via exif.c in function Put16u.
0
Attacker Value
Unknown
CVE-2022-41751
Disclosure Date: October 17, 2022 (last updated February 24, 2025)
Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option.
0
Attacker Value
Unknown
CVE-2021-28277
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A Heap-based Buffer Overflow vulnerabilty exists in jhead 3.04 and 3.05 is affected by: Buffer Overflow via the RemoveUnknownSections function in jpgfile.c.
0
Attacker Value
Unknown
CVE-2021-28275
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A Denial of Service vulnerability exists in jhead 3.04 and 3.05 due to a wild address read in the Get16u function in exif.c in will cause segmentation fault via a crafted_file.
0
Attacker Value
Unknown
CVE-2021-28276
Disclosure Date: March 23, 2022 (last updated November 29, 2024)
A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a wild address read in the ProcessCanonMakerNoteDir function in makernote.c.
0
Attacker Value
Unknown
CVE-2021-28278
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A Heap-based Buffer Overflow vulnerability exists in jhead 3.04 and 3.05 via the RemoveSectionType function in jpgfile.c.
0
Attacker Value
Unknown
CVE-2020-26208
Disclosure Date: February 02, 2022 (last updated February 23, 2025)
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.
0
Attacker Value
Unknown
CVE-2021-3496
Disclosure Date: April 22, 2021 (last updated February 22, 2025)
A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.
0
Attacker Value
Unknown
CVE-2020-6624
Disclosure Date: January 09, 2020 (last updated February 21, 2025)
jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.
0