CVE-2012-2806
Publication date 13 August 2012
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image.
Status
Package | Ubuntu Release | Status |
---|---|---|
libjpeg-turbo | ||
Notes
sbeattie
this vulnerability was introduced by http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=740 which is not in oneiric, precise, and quantal's versions. Also, example reproducers from the firefox bug report did not crash the djpeg tool from libjpeg-turbo-tools in those releases.
Patch details
Package | Patch details |
---|---|
libjpeg-turbo |
References
Other references
- http://www.openwall.com/lists/oss-security/2012/07/17/3
- https://bugzilla.redhat.com/show_bug.cgi?id=826849
- http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830
- https://bugzilla.mozilla.org/show_bug.cgi?id=759802
- https://bugzilla.mozilla.org/attachment.cgi?id=629790 (reproducer)
- https://www.cve.org/CVERecord?id=CVE-2012-2806