Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3822 (GCVE-0-2016-3822)
Vulnerability from cvelistv5
- n/a
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:10:31.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "name": "92226", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92226" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "name": "DSA-3825", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3825" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "name": "92226", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92226" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "name": "DSA-3825", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3825" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2016-3822", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://source.android.com/security/bulletin/2016-08-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "name": "92226", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92226" }, { "name": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b", "refsource": "CONFIRM", "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "name": "DSA-3825", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3825" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2016-3822", "datePublished": "2016-08-05T20:00:00", "dateReserved": "2016-03-30T00:00:00", "dateUpdated": "2024-08-06T00:10:31.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-3822\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2016-08-05T20:59:10.723\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.\"},{\"lang\":\"es\",\"value\":\"\\\" exif.c en Matthias Wandel jhead 2.87, como se usa en libjhead en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1 y 6.x en versiones anteriores a 2016-08-01, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (acceso fuera de rango) a trav\u00e9s de datos EXIF manipulados, tambi\u00e9n conocido como error interno 28868315.\\\"\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A39C31E3-75C0-4E92-A6B5-7D67B22E3449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB318EA4-2908-4B91-8DBB-20008FDF528A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4E46A9-B652-47CE-92E8-01021E57724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DD8E3F-6308-4680-B932-4CBD8E58A7FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9F0F7-D592-481E-884C-B1A94E702825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD857E7-B878-49F9-BDDA-93DDEBB0B42B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47AB858-36DE-4330-8CAC-1B46C5C8DA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49413FF7-7910-4F74-B106-C3170612CB2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8882E50-7C49-4A99-91F2-DF979CF8BB2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C32982-095C-4628-9958-118A3D3A9CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4E6353-B77A-464F-B7DE-932704003B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77125688-2CCA-4990-ABB2-551D47CB0CDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A8EC00-266C-409B-AD43-18E8DFCD6FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B846C63A-7261-481E-B4A4-0D8C79E0D8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70C6D8D-C9C3-4D92-8DFC-71F59E068295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691FA41B-C2CE-413F-ABB1-0B22CB322807\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://source.android.com/security/bulletin/2016-08-01.html\",\"source\":\"security@android.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3825\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92226\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b\",\"source\":\"security@android.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2016-08-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3825\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
ghsa-vq3j-5p4r-99x3
Vulnerability from github
exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.
{ "affected": [], "aliases": [ "CVE-2016-3822" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-08-05T20:59:00Z", "severity": "HIGH" }, "details": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "id": "GHSA-vq3j-5p4r-99x3", "modified": "2022-05-14T02:02:06Z", "published": "2022-05-14T02:02:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3822" }, { "type": "WEB", "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3825" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/92226" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
opensuse-su-2021:0752-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for jhead", "title": "Title of the patch" }, { "category": "description", "text": "This update for jhead fixes the following issues:\n\njhead was updated to 3.06.0.1\n\n* lot of fuzztest fixes\n* Apply a whole bunch of patches from Debian.\n* Spell check and fuzz test stuff from Debian, nothing useful to\n human users.\n* Add option to set exif date from date from another file.\n* Bug fixes relating to fuzz testing.\n* Fix bug where thumbnail replacement DID NOT WORK.\n* Fix bug when no orientation tag is present\n* Fix bug of not clearing exif information when processing images\n with an without exif data in one invocation.\n* Remove some unnecessary warnings with some types of GPS data\n* Remove multiple copies of the same type of section when deleting\n section types\n\nThis update was imported from the openSUSE:Leap:15.2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-752", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0752-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0752-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0752-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBTHCPCHWJ3JG5IDEDAYSW5LVUEVXYH/" }, { "category": "self", "summary": "SUSE Bug 1144316", "url": "https://bugzilla.suse.com/1144316" }, { "category": "self", "summary": "SUSE Bug 1144354", "url": "https://bugzilla.suse.com/1144354" }, { "category": "self", "summary": "SUSE Bug 1160544", "url": "https://bugzilla.suse.com/1160544" }, { "category": "self", "summary": "SUSE Bug 1160547", "url": "https://bugzilla.suse.com/1160547" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3822 page", "url": "https://www.suse.com/security/cve/CVE-2016-3822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16554 page", "url": "https://www.suse.com/security/cve/CVE-2018-16554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17088 page", "url": "https://www.suse.com/security/cve/CVE-2018-17088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6612 page", "url": "https://www.suse.com/security/cve/CVE-2018-6612/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010301 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010301/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010302 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010302/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6624 page", "url": "https://www.suse.com/security/cve/CVE-2020-6624/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6625 page", "url": "https://www.suse.com/security/cve/CVE-2020-6625/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3496 page", "url": "https://www.suse.com/security/cve/CVE-2021-3496/" } ], "title": "Security update for jhead", "tracking": { "current_release_date": "2021-05-19T16:05:20Z", "generator": { "date": "2021-05-19T16:05:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0752-1", "initial_release_date": "2021-05-19T16:05:20Z", "revision_history": [ { "date": "2021-05-19T16:05:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.aarch64", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.aarch64", "product_id": "jhead-3.06.0.1-bp152.4.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.ppc64le", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.ppc64le", "product_id": "jhead-3.06.0.1-bp152.4.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.s390x", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.s390x", "product_id": "jhead-3.06.0.1-bp152.4.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-bp152.4.6.1.x86_64", "product": { "name": "jhead-3.06.0.1-bp152.4.6.1.x86_64", "product_id": "jhead-3.06.0.1-bp152.4.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP2", "product": { "name": "SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.aarch64 as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.ppc64le as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.s390x as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-bp152.4.6.1.x86_64 as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" }, "product_reference": "jhead-3.06.0.1-bp152.4.6.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3822" } ], "notes": [ { "category": "general", "text": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3822", "url": "https://www.suse.com/security/cve/CVE-2016-3822" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2016-3822" }, { "cve": "CVE-2018-16554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16554" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16554", "url": "https://www.suse.com/security/cve/CVE-2018-16554" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2018-16554" }, { "cve": "CVE-2018-17088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17088" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17088", "url": "https://www.suse.com/security/cve/CVE-2018-17088" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2018-17088" }, { "cve": "CVE-2018-6612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6612" } ], "notes": [ { "category": "general", "text": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6612", "url": "https://www.suse.com/security/cve/CVE-2018-6612" }, { "category": "external", "summary": "SUSE Bug 1079349 for CVE-2018-6612", "url": "https://bugzilla.suse.com/1079349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "moderate" } ], "title": "CVE-2018-6612" }, { "cve": "CVE-2019-1010301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010301" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010301", "url": "https://www.suse.com/security/cve/CVE-2019-1010301" }, { "category": "external", "summary": "SUSE Bug 1144316 for CVE-2019-1010301", "url": "https://bugzilla.suse.com/1144316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2019-1010301" }, { "cve": "CVE-2019-1010302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010302" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010302", "url": "https://www.suse.com/security/cve/CVE-2019-1010302" }, { "category": "external", "summary": "SUSE Bug 1144354 for CVE-2019-1010302", "url": "https://bugzilla.suse.com/1144354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "low" } ], "title": "CVE-2019-1010302" }, { "cve": "CVE-2020-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6624" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6624", "url": "https://www.suse.com/security/cve/CVE-2020-6624" }, { "category": "external", "summary": "SUSE Bug 1160547 for CVE-2020-6624", "url": "https://bugzilla.suse.com/1160547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2020-6624" }, { "cve": "CVE-2020-6625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6625" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6625", "url": "https://www.suse.com/security/cve/CVE-2020-6625" }, { "category": "external", "summary": "SUSE Bug 1160544 for CVE-2020-6625", "url": "https://bugzilla.suse.com/1160544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2020-6625" }, { "cve": "CVE-2021-3496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3496" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3496", "url": "https://www.suse.com/security/cve/CVE-2021-3496" }, { "category": "external", "summary": "SUSE Bug 1184756 for CVE-2021-3496", "url": "https://bugzilla.suse.com/1184756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.aarch64", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.ppc64le", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.s390x", "SUSE Package Hub 15 SP2:jhead-3.06.0.1-bp152.4.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-19T16:05:20Z", "details": "important" } ], "title": "CVE-2021-3496" } ] }
opensuse-su-2024:10880-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "jhead-3.06.0.1-1.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the jhead-3.06.0.1-1.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10880", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10880-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3822 page", "url": "https://www.suse.com/security/cve/CVE-2016-3822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16554 page", "url": "https://www.suse.com/security/cve/CVE-2018-16554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17088 page", "url": "https://www.suse.com/security/cve/CVE-2018-17088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6612 page", "url": "https://www.suse.com/security/cve/CVE-2018-6612/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3496 page", "url": "https://www.suse.com/security/cve/CVE-2021-3496/" } ], "title": "jhead-3.06.0.1-1.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10880-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.aarch64", "product": { "name": "jhead-3.06.0.1-1.3.aarch64", "product_id": "jhead-3.06.0.1-1.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.ppc64le", "product": { "name": "jhead-3.06.0.1-1.3.ppc64le", "product_id": "jhead-3.06.0.1-1.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.s390x", "product": { "name": "jhead-3.06.0.1-1.3.s390x", "product_id": "jhead-3.06.0.1-1.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-1.3.x86_64", "product": { "name": "jhead-3.06.0.1-1.3.x86_64", "product_id": "jhead-3.06.0.1-1.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64" }, "product_reference": "jhead-3.06.0.1-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le" }, "product_reference": "jhead-3.06.0.1-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x" }, "product_reference": "jhead-3.06.0.1-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" }, "product_reference": "jhead-3.06.0.1-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3822" } ], "notes": [ { "category": "general", "text": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3822", "url": "https://www.suse.com/security/cve/CVE-2016-3822" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3822" }, { "cve": "CVE-2018-16554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16554" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16554", "url": "https://www.suse.com/security/cve/CVE-2018-16554" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-16554" }, { "cve": "CVE-2018-17088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17088" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17088", "url": "https://www.suse.com/security/cve/CVE-2018-17088" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-17088" }, { "cve": "CVE-2018-6612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6612" } ], "notes": [ { "category": "general", "text": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6612", "url": "https://www.suse.com/security/cve/CVE-2018-6612" }, { "category": "external", "summary": "SUSE Bug 1079349 for CVE-2018-6612", "url": "https://bugzilla.suse.com/1079349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-6612" }, { "cve": "CVE-2021-3496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3496" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3496", "url": "https://www.suse.com/security/cve/CVE-2021-3496" }, { "category": "external", "summary": "SUSE Bug 1184756 for CVE-2021-3496", "url": "https://bugzilla.suse.com/1184756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.aarch64", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.ppc64le", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.s390x", "openSUSE Tumbleweed:jhead-3.06.0.1-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3496" } ] }
opensuse-su-2021:0743-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for jhead", "title": "Title of the patch" }, { "category": "description", "text": "This update for jhead fixes the following issues:\n\njhead was updated to 3.06.0.1\n\n* lot of fuzztest fixes\n* Apply a whole bunch of patches from Debian.\n* Spell check and fuzz test stuff from Debian, nothing useful to\n human users.\n* Add option to set exif date from date from another file.\n* Bug fixes relating to fuzz testing.\n* Fix bug where thumbnail replacement DID NOT WORK.\n* Fix bug when no orientation tag is present\n* Fix bug of not clearing exif information when processing images\n with an without exif data in one invocation.\n* Remove some unnecessary warnings with some types of GPS data\n* Remove multiple copies of the same type of section when deleting\n section types\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-743", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0743-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0743-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0743-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPTEPBJVJFSKKHSTZER2JVIMRP7MGN2C/" }, { "category": "self", "summary": "SUSE Bug 1144316", "url": "https://bugzilla.suse.com/1144316" }, { "category": "self", "summary": "SUSE Bug 1144354", "url": "https://bugzilla.suse.com/1144354" }, { "category": "self", "summary": "SUSE Bug 1160544", "url": "https://bugzilla.suse.com/1160544" }, { "category": "self", "summary": "SUSE Bug 1160547", "url": "https://bugzilla.suse.com/1160547" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3822 page", "url": "https://www.suse.com/security/cve/CVE-2016-3822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16554 page", "url": "https://www.suse.com/security/cve/CVE-2018-16554/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17088 page", "url": "https://www.suse.com/security/cve/CVE-2018-17088/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6612 page", "url": "https://www.suse.com/security/cve/CVE-2018-6612/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010301 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010301/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010302 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010302/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6624 page", "url": "https://www.suse.com/security/cve/CVE-2020-6624/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-6625 page", "url": "https://www.suse.com/security/cve/CVE-2020-6625/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3496 page", "url": "https://www.suse.com/security/cve/CVE-2021-3496/" } ], "title": "Security update for jhead", "tracking": { "current_release_date": "2021-05-16T14:04:45Z", "generator": { "date": "2021-05-16T14:04:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0743-1", "initial_release_date": "2021-05-16T14:04:45Z", "revision_history": [ { "date": "2021-05-16T14:04:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jhead-3.06.0.1-lp152.7.6.1.x86_64", "product": { "name": "jhead-3.06.0.1-lp152.7.6.1.x86_64", "product_id": "jhead-3.06.0.1-lp152.7.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jhead-3.06.0.1-lp152.7.6.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" }, "product_reference": "jhead-3.06.0.1-lp152.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3822" } ], "notes": [ { "category": "general", "text": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3822", "url": "https://www.suse.com/security/cve/CVE-2016-3822" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2016-3822", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2016-3822" }, { "cve": "CVE-2018-16554", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16554" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16554", "url": "https://www.suse.com/security/cve/CVE-2018-16554" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-16554", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2018-16554" }, { "cve": "CVE-2018-17088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17088" } ], "notes": [ { "category": "general", "text": "The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17088", "url": "https://www.suse.com/security/cve/CVE-2018-17088" }, { "category": "external", "summary": "SUSE Bug 1108480 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108480" }, { "category": "external", "summary": "SUSE Bug 1108672 for CVE-2018-17088", "url": "https://bugzilla.suse.com/1108672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2018-17088" }, { "cve": "CVE-2018-6612", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6612" } ], "notes": [ { "category": "general", "text": "An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6612", "url": "https://www.suse.com/security/cve/CVE-2018-6612" }, { "category": "external", "summary": "SUSE Bug 1079349 for CVE-2018-6612", "url": "https://bugzilla.suse.com/1079349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "moderate" } ], "title": "CVE-2018-6612" }, { "cve": "CVE-2019-1010301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010301" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010301", "url": "https://www.suse.com/security/cve/CVE-2019-1010301" }, { "category": "external", "summary": "SUSE Bug 1144316 for CVE-2019-1010301", "url": "https://bugzilla.suse.com/1144316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2019-1010301" }, { "cve": "CVE-2019-1010302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010302" } ], "notes": [ { "category": "general", "text": "jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010302", "url": "https://www.suse.com/security/cve/CVE-2019-1010302" }, { "category": "external", "summary": "SUSE Bug 1144354 for CVE-2019-1010302", "url": "https://bugzilla.suse.com/1144354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "low" } ], "title": "CVE-2019-1010302" }, { "cve": "CVE-2020-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6624" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6624", "url": "https://www.suse.com/security/cve/CVE-2020-6624" }, { "category": "external", "summary": "SUSE Bug 1160547 for CVE-2020-6624", "url": "https://bugzilla.suse.com/1160547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2020-6624" }, { "cve": "CVE-2020-6625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-6625" } ], "notes": [ { "category": "general", "text": "jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-6625", "url": "https://www.suse.com/security/cve/CVE-2020-6625" }, { "category": "external", "summary": "SUSE Bug 1160544 for CVE-2020-6625", "url": "https://bugzilla.suse.com/1160544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2020-6625" }, { "cve": "CVE-2021-3496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3496" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3496", "url": "https://www.suse.com/security/cve/CVE-2021-3496" }, { "category": "external", "summary": "SUSE Bug 1184756 for CVE-2021-3496", "url": "https://bugzilla.suse.com/1184756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:jhead-3.06.0.1-lp152.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-16T14:04:45Z", "details": "important" } ], "title": "CVE-2021-3496" } ] }
CERTFR-2016-AVI-257
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Google Android (Nexus). Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Android (Nexus) toutes versions n'intégrant pas le correctif de sécurité du 1 août 2016
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eGoogle Android (Nexus) toutes versions n\u0027int\u00e9grant pas le correctif de s\u00e9curit\u00e9 du 1 ao\u00fbt 2016\u003c/P\u003e", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-3820", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3820" }, { "name": "CVE-2015-8942", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8942" }, { "name": "CVE-2014-9903", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9903" }, { "name": "CVE-2014-9863", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9863" }, { "name": "CVE-2015-8938", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8938" }, { "name": "CVE-2014-9898", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9898" }, { "name": "CVE-2016-2544", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2544" }, { "name": "CVE-2016-3823", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3823" }, { "name": "CVE-2016-4578", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4578" }, { "name": "CVE-2014-9864", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9864" }, { "name": "CVE-2016-3832", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3832" }, { "name": "CVE-2014-9896", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9896" }, { "name": "CVE-2014-9877", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9877" }, { "name": "CVE-2014-9866", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9866" }, { "name": "CVE-2016-3819", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3819" }, { "name": "CVE-2016-3839", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3839" }, { "name": "CVE-2016-3836", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3836" }, { "name": "CVE-2014-9902", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9902" }, { "name": "CVE-2014-9893", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9893" }, { "name": "CVE-2015-8941", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8941" }, { "name": "CVE-2016-3842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3842" }, { "name": "CVE-2015-8944", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8944" }, { "name": "CVE-2016-3847", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3847" }, { "name": "CVE-2014-9887", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9887" }, { "name": "CVE-2014-9874", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9874" }, { "name": "CVE-2014-9884", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9884" }, { "name": "CVE-2016-3857", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3857" }, { "name": "CVE-2016-3844", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3844" }, { "name": "CVE-2014-9868", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9868" }, { "name": "CVE-2014-9904", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9904" }, { "name": "CVE-2014-9897", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9897" }, { "name": "CVE-2015-8937", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8937" }, { "name": "CVE-2016-3834", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3834" }, { "name": "CVE-2014-9895", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9895" }, { "name": "CVE-2014-9886", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9886" }, { "name": "CVE-2014-9894", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9894" }, { "name": "CVE-2016-3837", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3837" }, { "name": "CVE-2014-9900", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9900" }, { "name": "CVE-2015-2686", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2686" }, { "name": "CVE-2014-9882", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9882" }, { "name": "CVE-2014-9880", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9880" }, { "name": "CVE-2016-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3830" }, { "name": "CVE-2014-9869", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9869" }, { "name": "CVE-2015-1593", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1593" }, { "name": "CVE-2014-9876", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9876" }, { "name": "CVE-2014-9867", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9867" }, { "name": "CVE-2016-3843", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3843" }, { "name": "CVE-2014-9892", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9892" }, { "name": "CVE-2012-6701", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6701" }, { "name": "CVE-2014-9872", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9872" }, { "name": "CVE-2016-3840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3840" }, { "name": "CVE-2016-3841", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3841" }, { "name": "CVE-2016-3826", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3826" }, { "name": "CVE-2014-9885", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9885" }, { "name": "CVE-2016-3846", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3846" }, { "name": "CVE-2016-4569", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4569" }, { "name": "CVE-2014-9871", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9871" }, { "name": "CVE-2014-9891", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9891" }, { "name": "CVE-2016-3856", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3856" }, { "name": "CVE-2016-3821", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3821" }, { "name": "CVE-2014-9881", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9881" }, { "name": "CVE-2016-3851", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3851" }, { "name": "CVE-2014-9875", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9875" }, { "name": "CVE-2016-3829", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3829" }, { "name": "CVE-2014-9890", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9890" }, { "name": "CVE-2015-8943", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8943" }, { "name": "CVE-2016-3831", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3831" }, { "name": "CVE-2014-9899", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9899" }, { "name": "CVE-2016-2504", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2504" }, { "name": "CVE-2015-8939", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8939" }, { "name": "CVE-2014-9889", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9889" }, { "name": "CVE-2016-3833", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3833" }, { "name": "CVE-2016-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3672" }, { "name": "CVE-2016-3854", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3854" }, { "name": "CVE-2014-9901", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9901" }, { "name": "CVE-2016-3825", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3825" }, { "name": "CVE-2016-4482", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4482" }, { "name": "CVE-2014-9878", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9878" }, { "name": "CVE-2016-3852", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3852" }, { "name": "CVE-2016-3849", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3849" }, { "name": "CVE-2016-2497", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2497" }, { "name": "CVE-2014-9883", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9883" }, { "name": "CVE-2014-9873", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9873" }, { "name": "CVE-2014-9865", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9865" }, { "name": "CVE-2016-3822", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3822" }, { "name": "CVE-2015-8940", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8940" }, { "name": "CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "name": "CVE-2016-3835", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3835" }, { "name": "CVE-2014-9888", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9888" }, { "name": "CVE-2016-2546", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2546" }, { "name": "CVE-2016-3845", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3845" }, { "name": "CVE-2016-3828", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3828" }, { "name": "CVE-2016-3838", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3838" }, { "name": "CVE-2016-3850", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3850" }, { "name": "CVE-2014-9879", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9879" }, { "name": "CVE-2016-3827", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3827" }, { "name": "CVE-2016-3855", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3855" }, { "name": "CVE-2016-3824", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3824" }, { "name": "CVE-2014-9870", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9870" }, { "name": "CVE-2016-3853", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3853" }, { "name": "CVE-2016-3848", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3848" } ], "initial_release_date": "2016-08-02T00:00:00", "last_revision_date": "2016-08-02T00:00:00", "links": [], "reference": "CERTFR-2016-AVI-257", "revisions": [ { "description": "version initiale.", "revision_date": "2016-08-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Android (Nexus)\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android (Nexus)", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Android du 01 ao\u00fbt 2016", "url": "https://source.android.com/security/bulletin/2016-08-01.html" } ] }
cnvd-2016-06124
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://support.blackberry.com/kb/articleDetail?articleNumber=000038360
Name | ['Google Android Android 4.*,<4.4.4', 'Google Android Android 5.0.*,<5.0.2', 'Google Android Android 5.1.*,<5.1.1', 'Google Android 6.*,<2016-08-01'] |
---|
{ "bids": { "bid": { "bidNumber": "92226" } }, "cves": { "cve": { "cveNumber": "CVE-2016-3822" } }, "description": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nAndroid\u4e2d\u7684libjhead\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6784\u5efa\u7279\u6b8a\u6587\u4ef6\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002", "discovererName": "Dawei Peng (Vinc3nt4H) of Alibaba Mobile Security Team", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://support.blackberry.com/kb/articleDetail?articleNumber=000038360", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-06124", "openTime": "2016-08-09", "patchDescription": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nAndroid\u4e2d\u7684libjhead\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6784\u5efa\u7279\u6b8a\u6587\u4ef6\uff0c\u8bf1\u4f7f\u5e94\u7528\u89e3\u6790\uff0c\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Google Android libjhead\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Google Android Android 4.*\uff0c\u003c4.4.4", "Google Android Android 5.0.*\uff0c\u003c5.0.2", "Google Android Android 5.1.*\uff0c\u003c5.1.1", "Google Android 6.*\uff0c\u003c2016-08-01" ] }, "referenceLink": "http://support.blackberry.com/kb/articleDetail?articleNumber=000038360", "serverity": "\u9ad8", "submitTime": "2016-08-05", "title": "Google Android libjhead\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e" }
gsd-2016-3822
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-3822", "description": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "id": "GSD-2016-3822", "references": [ "https://www.suse.com/security/cve/CVE-2016-3822.html", "https://www.debian.org/security/2017/dsa-3825", "https://advisories.mageia.org/CVE-2016-3822.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-3822" ], "details": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315.", "id": "GSD-2016-3822", "modified": "2023-12-13T01:21:27.925306Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2016-3822", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://source.android.com/security/bulletin/2016-08-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "name": "92226", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92226" }, { "name": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b", "refsource": "CONFIRM", "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "name": "DSA-3825", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3825" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2016-3822" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "name": "http://source.android.com/security/bulletin/2016-08-01.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "name": "92226", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92226" }, { "name": "DSA-3825", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3825" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2018-11-05T20:33Z", "publishedDate": "2016-08-05T20:59Z" } } }
fkie_cve-2016-3822
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
security@android.com | http://source.android.com/security/bulletin/2016-08-01.html | Vendor Advisory | |
security@android.com | http://www.debian.org/security/2017/dsa-3825 | Third Party Advisory | |
security@android.com | http://www.securityfocus.com/bid/92226 | Third Party Advisory, VDB Entry | |
security@android.com | https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://source.android.com/security/bulletin/2016-08-01.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3825 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92226 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b | Issue Tracking, Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
android | 4.0 | ||
android | 4.0.1 | ||
android | 4.0.2 | ||
android | 4.0.3 | ||
android | 4.0.4 | ||
android | 4.1 | ||
android | 4.1.2 | ||
android | 4.2 | ||
android | 4.2.1 | ||
android | 4.2.2 | ||
android | 4.3 | ||
android | 4.3.1 | ||
android | 4.4 | ||
android | 4.4.1 | ||
android | 4.4.2 | ||
android | 4.4.3 | ||
android | 5.0 | ||
android | 5.0.1 | ||
android | 5.1 | ||
android | 5.1.0 | ||
android | 6.0 | ||
android | 6.0.1 | ||
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C4E6353-B77A-464F-B7DE-932704003B33", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "77125688-2CCA-4990-ABB2-551D47CB0CDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B846C63A-7261-481E-B4A4-0D8C79E0D8A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "exif.c in Matthias Wandel jhead 2.87, as used in libjhead in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds access) via crafted EXIF data, aka internal bug 28868315." }, { "lang": "es", "value": "\" exif.c en Matthias Wandel jhead 2.87, como se usa en libjhead en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1 y 6.x en versiones anteriores a 2016-08-01, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (acceso fuera de rango) a trav\u00e9s de datos EXIF manipulados, tambi\u00e9n conocido como error interno 28868315.\"" } ], "id": "CVE-2016-3822", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T20:59:10.723", "references": [ { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "source": "security@android.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3825" }, { "source": "security@android.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92226" }, { "source": "security@android.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://source.android.com/security/bulletin/2016-08-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://android.googlesource.com/platform/external/jhead/+/bae671597d47b9e5955c4cb742e468cebfd7ca6b" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.