First published: Tue Jun 13 2023(Updated: )
Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jhead Project Jhead | =3.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28550 is a vulnerability found in jhead 3.06, a software library used for manipulating and editing JPEG files.
CVE-2022-28550 has a severity rating of 9.8, which is considered critical.
The affected software version is jhead 3.06.
The vulnerability in CVE-2022-28550 is a buffer overflow issue in the shellescape() function of the jhead.c file in jhead.
Yes, there are references available for CVE-2022-28550. You can find them at the following links: [link1](https://github.com/Matthias-Wandel/jhead/commit/64894dbc7d8e1e232e85f1cab25c64290b2fc167) and [link2](https://github.com/Matthias-Wandel/jhead/issues/51).