Upstream information

CVE-2018-16554 at MITRE

Description

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.

SUSE information

Overall state of this security issue: Resolved

This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.8
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3
SUSE Bugzilla entries: 1108480 [RESOLVED / FIXED], 1108672 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP2
  • jhead >= 3.06.0.1-bp152.4.6.1
Patchnames:
openSUSE-2021-752
SUSE Package Hub 15
  • jhead >= 3.00-bp150.3.7.1
Patchnames:
openSUSE-2019-698
openSUSE-2019-858
openSUSE Leap 15.0
  • jhead >= 3.00-lp150.3.6.1
Patchnames:
openSUSE-2019-698
openSUSE-2019-858
openSUSE Leap 15.2
  • jhead >= 3.06.0.1-lp152.7.6.1
Patchnames:
openSUSE-2021-743
openSUSE Tumbleweed
  • jhead >= 3.06.0.1-1.3
Patchnames:
openSUSE-Tumbleweed-2024-10880


SUSE Timeline for this CVE

CVE page created: Fri Sep 14 13:18:59 2018
CVE page last modified: Sun Jun 16 00:13:19 2024