First published: Wed Feb 02 2022(Updated: )
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead Project Jhead | <3.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26208 is a vulnerability found in the Jhead project's Jhead command line tool.
Jhead is a simple command line tool used for displaying and manipulating EXIF header data in JPEG images from digital cameras.
CVE-2020-26208 has a severity of 6.1, which is considered medium.
The vulnerability affects Jhead versions up to and including 3.04.
Crafted JPEG images can be provided to the user, resulting in a heap buffer overflow in the ReadJpegSections function of jhead-3.04/jpgfile.c.
You can find more information about CVE-2020-26208 at the following references: [Link 1](https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821), [Link 2](https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4), [Link 3](https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc)
CWE-787 is a vulnerability type known as Out-of-bounds Write.