Описание
Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.0-2ubuntu4.1 |
| esm-infra-legacy/trusty | released | 2.0-2ubuntu4.1 |
| lucid | DNE | |
| precise | DNE | |
| quantal | released | 2.0-2ubuntu1.12.10.1 |
| saucy | released | 2.0-2ubuntu1.13.10.1 |
| trusty | released | 2.0-2ubuntu4.1 |
| trusty/esm | released | 2.0-2ubuntu4.1 |
| upstream | released | 2.0-2.1 |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig ...
Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.8 Medium
CVSS2