libjpeg-turbo 1.0.0

CPE Details

libjpeg-turbo 1.0.0
1.0.0
2019-06-14
15h52 +00:00
2019-06-14
15h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:1.0.0:*:*:*:*:*:*:*

Informations

Vendor

libjpeg-turbo

Product

libjpeg-turbo

Version

1.0.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-17541 2021-06-01 12h44 +00:00 Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
8.8
High
CVE-2018-14498 2019-03-07 21h00 +00:00 get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
6.5
Medium
CVE-2014-9092 2017-10-10 11h00 +00:00 libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker.
6.5
Medium
CVE-2013-6629 2013-11-15 19h00 +00:00 The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
5