SB2020061712 - Multiple vulnerabilities in libjpeg



SB2020061712 - Multiple vulnerabilities in libjpeg

Published: June 17, 2020

Security Bulletin ID SB2020061712
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2020-14151)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or disclose sensitive information.

The vulnerability exists due to mishandling EOF in "read_*_pixel()" function in "rdtarga.c" file in cjpeg. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and gain access to sensitive information or cause a denial of service condition on the target system.


2) Buffer overflow (CVE-ID: CVE-2020-14152)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or disclose sensitive information.

The vulnerability exists due to a boundary error in "jpeg_mem_available()" function in "jmemnobs.c" file in djpeg. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and gain access to sensitive information or cause a denial of service condition on the target system.



3) Buffer overflow (CVE-ID: CVE-2020-14153)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or disclose sensitive information.

The vulnerability exists due to a boundary error in certain table pointers in "jdhuff.c" file. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and gain access to sensitive information or cause a denial of service condition on the target system.


Remediation

Install update from vendor's website.