[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-41751Date: (C)2022-10-19   (M)2024-01-04


Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.8CVSS Score :
Exploit Score: 1.8Exploit Score:
Impact Score: 5.9Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: REQUIREDConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-5294
FEDORA-2022-1d9133bc8e
FEDORA-2022-61ec901852
FEDORA-2022-628829f0e6
https://lists.debian.org/debian-lts-announce/2022/12/msg00004.html
https://github.com/Matthias-Wandel/jhead
https://github.com/Matthias-Wandel/jhead/blob/63ce118c6a59ea64ac357236a11a47aaf569d622/jhead.c#L788
https://github.com/Matthias-Wandel/jhead/pull/57

CWE    1
CWE-78
OVAL    9
oval:org.secpod.oval:def:708187
oval:org.secpod.oval:def:93204
oval:org.secpod.oval:def:610293
oval:org.secpod.oval:def:124339
...

© SecPod Technologies