First published: Sun Mar 26 2023(Updated: )
A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libjpeg-turbo Libjpeg-turbo | <2.1.91 | |
Libjpeg-turbo Libjpeg-turbo | =2.1.90 | |
redhat/libjpeg-turbo | <3.0 | 3.0 |
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2804.
The severity of CVE-2023-2804 is medium with a severity value of 6.5.
Libjpeg-turbo versions up to 2.1.91 and 2.1.90, as well as version 3.0, are affected by CVE-2023-2804.
CVE-2023-2804 is a heap-based buffer overflow issue in libjpeg-turbo, specifically in the h2v2_merged_upsample_internal() function in the jdmrgext.c file.
An attacker can exploit CVE-2023-2804 by using 12-bit data precision, causing the range of the sample data type to exceed the valid sample range.