[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:602843
It was discovered that jhead, a tool to manipulate the non-image part of EXIF compliant JPEG files, is prone to an out-of-bounds access vulnerability, which may result in denial of service or, potentially, the execution of arbitrary code if an image with specially crafted EXIF data is processed.

oval:org.secpod.oval:def:602844
jhead is installed

oval:org.secpod.oval:def:114109
jhead is installed

oval:org.secpod.oval:def:2000079
An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.

oval:org.secpod.oval:def:114108
Jhead displays and manipulates the non-image portions of EXIF formatted JPEG images, such as the images produced by most digital cameras.

oval:org.secpod.oval:def:114157
Jhead displays and manipulates the non-image portions of EXIF formatted JPEG images, such as the images produced by most digital cameras.

oval:org.secpod.oval:def:3301241
SUSE Security Update: Security update for jhead

oval:org.secpod.oval:def:93899
jhead: Manipulate the non-image part of Exif compliant JPEG files Several security issues were fixed in Jhead.

oval:org.secpod.oval:def:117546
Jhead displays and manipulates the non-image portions of EXIF formatted JPEG images, such as the images produced by most digital cameras.

oval:org.secpod.oval:def:117542
Jhead displays and manipulates the non-image portions of EXIF formatted JPEG images, such as the images produced by most digital cameras.

oval:org.secpod.oval:def:708484
jhead: Manipulate the non-image part of Exif compliant JPEG files Jhead could be made to crash if it opened a specially crafted file.

oval:org.secpod.oval:def:95042
jhead: Manipulate the non-image part of Exif compliant JPEG files Jhead could be made to crash if it opened a specially crafted file.

oval:org.secpod.oval:def:610293
Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option. In addition a buffer overflow error in exif.c has been addressed which could lead to ...

oval:org.secpod.oval:def:3300100
SUSE Security Update: Security update for jhead

oval:org.secpod.oval:def:3301201
SUSE Security Update: Security update for jhead

oval:org.secpod.oval:def:88438
Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option. In addition a buffer overflow error in exif.c has been addressed which could lead to ...

oval:org.secpod.oval:def:3302046
Security update for jhead

*CPE
cpe:/a:sentex:jhead

© SecPod Technologies