First published: Thu May 31 2012(Updated: )
A Heap-based buffer overflow was found in the way libjpeg-turbo decompressed certain corrupt JPEG images in which the component count was erroneously set to a large value. An attacker could create a specially-crafted JPEG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. Patch: <a href="http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830">http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830</a> References: <a href="http://code.google.com/p/chromium/issues/detail?id=130240">http://code.google.com/p/chromium/issues/detail?id=130240</a> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=759802">https://bugzilla.mozilla.org/show_bug.cgi?id=759802</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libjpeg-turbo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-826849 is classified as critical due to its potential to cause application crashes.
To fix REDHAT-BUG-826849, update libjpeg-turbo to the latest version that includes the security patch addressing this vulnerability.
Applications that utilize libjpeg-turbo for JPEG image processing are affected by REDHAT-BUG-826849.
An attacker can create a specially-crafted JPEG image that can crash applications using libjpeg-turbo when processed.
As of now, there is no specific known exploit publicly documented for REDHAT-BUG-826849, but the vulnerability presents a serious risk.