First published: Fri Sep 07 2018(Updated: )
The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead Project Jhead | =3.00 | |
debian/jhead | <=1:3.00-7<=1:3.00-4 | |
debian/jhead | 1:3.04-6+deb11u1 1:3.06.0.1-6 1:3.08-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16554 is a vulnerability in the ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00, allowing a remote attacker to cause a denial-of-service attack or other unspecified impact via a malicious JPEG file.
CVE-2018-16554 affects jhead version 3.00.
CVE-2018-16554 has a severity rating of 7.8 (high).
To fix CVE-2018-16554, upgrade to jhead version 3.04 or higher.
You can find more information about CVE-2018-16554 at the following references: [link1](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176), [link2](https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html), [link3](https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more)