First published: Tue Sep 04 2018(Updated: )
The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead Project Jhead | =3.00 | |
debian/jhead | 1:3.04-6+deb11u1 1:3.06.0.1-6 1:3.08-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17088 is high.
CVE-2018-17088 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file.
There is currently no known fix for CVE-2018-17088. It is recommended to update to the latest version of jhead if available or consider using an alternative software.
The Common Vulnerabilities and Exposures (CVE) ID of this vulnerability is CVE-2018-17088.
The Common Weakness Enumeration (CWE) ID of this vulnerability is CWE-190.