First published: Thu Jan 09 2020(Updated: )
jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead Project Jhead | <=3.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6624 is a vulnerability in jhead through 3.04 that causes a heap-based buffer over-read in the process_DQT function in jpgqguess.c.
CVE-2020-6624 has a severity score of 7.1, which is considered high.
Software versions up to and including 3.04 of the Jhead Project's jhead tool are affected by CVE-2020-6624.
The Common Weakness Enumeration (CWE) ID for CVE-2020-6624 is 125.
To fix CVE-2020-6624, it is recommended to upgrade to a version of jhead that is higher than 3.04.