Buffer overflow in libjpeg-turbo



Published: 2017-07-27 | Updated: 2020-08-09
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-9614
CWE-ID CWE-119
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
libjpeg-turbo
Client/Desktop applications / Multimedia software

Vendor The libjpeg-turbo Project

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU38641

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-9614

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The fill_input_buffer function in jdatasrc.c in libjpeg-turbo 1.5.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted jpg file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libjpeg-turbo: 1.5.1

External links

http://seclists.org/fulldisclosure/2017/Jul/66
http://www.exploit-db.com/exploits/42391/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###