Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-2201

Опубликовано: 05 июл. 2019
Источник: redhat
CVSS3: 7.8

Описание

In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338

Отчет

This vulnerability is rated as a moderate, due to a missing bounds check  in generate_jsimd_ycc_rgb_convert_neon within jsimd_arm64_neon.S, which could cause an out-of-bounds write, this could result in remote code execution, it requires user interaction (such as opening a crafted file) for exploitation, achieving successful exploitation is difficult and depends on specific conditions. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-121: Stack-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by stack-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques are used to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against memory buffer overflows and denial-of-service attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libjpeg-turboOut of support scope
Red Hat Enterprise Linux 7libjpeg-turboWill not fix
Red Hat Enterprise Linux 8libjpeg-turboWill not fix
Red Hat Enterprise Linux 8mingw-libjpeg-turboWill not fix
Red Hat Enterprise Linux 9libjpeg-turboNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1770982libjpeg-turbo: several integer overflows and subsequent segfaults when attempting to compress/decompress gigapixel images

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338

CVSS3: 7.8
nvd
около 6 лет назад

In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338

CVSS3: 7.8
debian
около 6 лет назад

In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is ...

suse-cvrf
около 6 лет назад

Security update for libjpeg-turbo

suse-cvrf
около 6 лет назад

Security update for libjpeg-turbo

7.8 High

CVSS3