First published: Wed Oct 15 2008(Updated: )
Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead | <=2.82 | |
Jhead | =1.2 | |
Jhead | =1.3 | |
Jhead | =1.4 | |
Jhead | =1.5 | |
Jhead | =1.6 | |
Jhead | =1.7 | |
Jhead | =1.8 | |
Jhead | =1.9 | |
Jhead | =2.0 | |
Jhead | =2.1 | |
Jhead | =2.2 | |
Jhead | =2.3 | |
Jhead | =2.4 | |
Jhead | =2.4-1 | |
Jhead | =2.4-2 | |
Jhead | =2.5 | |
Jhead | =2.6 | |
Jhead | =2.7 | |
Jhead | =2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4575 has a severity rating that suggests it can lead to denial of service conditions.
To fix CVE-2008-4575, you should upgrade to jhead version 2.84 or later.
CVE-2008-4575 affects jhead versions prior to 2.84 and several earlier versions including 1.2 to 2.8.
CVE-2008-4575 enables attackers to exploit a buffer overflow leading to a potential crash of the application.
CVE-2008-4575 is a context-dependent vulnerability, which means it may require local access to exploit effectively.