#VU38641 Buffer overflow in libjpeg-turbo


Published: 2020-08-09

Vulnerability identifier: #VU38641

Vulnerability risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-9614

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
libjpeg-turbo
Client/Desktop applications / Multimedia software

Vendor: The libjpeg-turbo Project

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The fill_input_buffer function in jdatasrc.c in libjpeg-turbo 1.5.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted jpg file.

Mitigation
Install update from vendor's website.

Vulnerable software versions

libjpeg-turbo: 1.5.1


External links
http://seclists.org/fulldisclosure/2017/Jul/66
http://www.exploit-db.com/exploits/42391/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability