Show filters
42 Total Results
Displaying 21-30 of 42
Sort by:
Attacker Value
Unknown
CVE-2021-39515
Disclosure Date: September 20, 2021 (last updated February 23, 2025)
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function SampleInterleavedLSScan::ParseMCU() located in sampleinterleavedlsscan.cpp. It allows an attacker to cause Denial of Service.
0
Attacker Value
Unknown
CVE-2021-39518
Disclosure Date: September 20, 2021 (last updated February 23, 2025)
An issue was discovered in libjpeg through 2020021. LineBuffer::FetchRegion() in linebuffer.cpp has a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2020-17541
Disclosure Date: June 01, 2021 (last updated February 22, 2025)
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
0
Attacker Value
Unknown
CVE-2021-20205
Disclosure Date: March 10, 2021 (last updated February 22, 2025)
Libjpeg-turbo versions 2.0.91 and 2.0.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted GIF image.
0
Attacker Value
Unknown
CVE-2020-14153
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
In IJG JPEG (aka libjpeg) from version 8 through 9c, jdhuff.c has an out-of-bounds array read for certain table pointers.
0
Attacker Value
Unknown
CVE-2020-14152
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
In IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnobs.c in djpeg does not honor the max_memory_to_use setting, possibly causing excessive memory consumption.
0
Attacker Value
Unknown
CVE-2020-13790
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
0
Attacker Value
Unknown
CVE-2019-13960
Disclosure Date: July 18, 2019 (last updated November 08, 2023)
In libjpeg-turbo 2.0.2, a large amount of memory can be used during processing of an invalid progressive JPEG image containing incorrect width and height values in the image header. NOTE: the vendor's expectation, for use cases in which this memory usage would be a denial of service, is that the application should interpret libjpeg warnings as fatal errors (aborting decompression) and/or set limits on resource consumption or image sizes
0
Attacker Value
Unknown
CVE-2018-14498
Disclosure Date: March 07, 2019 (last updated November 08, 2023)
get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
0
Attacker Value
Unknown
CVE-2018-20330
Disclosure Date: December 21, 2018 (last updated November 27, 2024)
The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.
0