Vulnerabilities
Vulnerable Software
Jhead Project:  >> Jhead  >> 3.03  Security Vulnerabilities
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.
CVSS Score
5.3
EPSS Score
0.001
Published
2022-02-02
jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.
CVSS Score
7.1
EPSS Score
0.007
Published
2020-01-09
jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.
CVSS Score
7.1
EPSS Score
0.009
Published
2020-01-09
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
CVSS Score
5.5
EPSS Score
0.002
Published
2019-11-17
jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.
CVSS Score
5.5
EPSS Score
0.001
Published
2019-07-15
jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.
CVSS Score
5.5
EPSS Score
0.001
Published
2019-07-15


Contact Us

Shodan ® - All rights reserved