SB2018091606 - Multiple vulnerabilities in www.sentex.net jhead



SB2018091606 - Multiple vulnerabilities in www.sentex.net jhead

Published: September 16, 2018 Updated: August 8, 2020

Security Bulletin ID SB2018091606
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2018-17088)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.


2) Format string error (CVE-ID: CVE-2018-16554)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.


Remediation

Install update from vendor's website.