First published: Mon Mar 11 2019(Updated: )
get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries. Upstream patch: <a href="https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55">https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55</a> Upstream issue: <a href="https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258">https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258</a> References: <a href="https://github.com/mozilla/mozjpeg/issues/299">https://github.com/mozilla/mozjpeg/issues/299</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libjpeg-turbo | <=1.5.90 | |
Mozilla MozJPEG | <=3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1687424 is categorized as a denial of service vulnerability that can cause application crashes.
To fix REDHAT-BUG-1687424, update libjpeg-turbo to version 1.5.91 or later and MozJPEG to version 3.3.2 or later.
REDHAT-BUG-1687424 affects libjpeg-turbo versions up to 1.5.90 and MozJPEG versions up to 3.3.1.
An attacker can exploit REDHAT-BUG-1687424 to cause heap-based buffer over-reads leading to application crashes.
It is recommended to validate BMP files to ensure that color indices are within permitted ranges before processing.