Libjpeg-turbo

Libjpeg-turbo

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 22.08.2023 19:16:20
  • Zuletzt bearbeitet 21.11.2024 06:01:01

libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 25.05.2023 22:15:09
  • Zuletzt bearbeitet 16.01.2025 16:15:29

A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds ...

  • EPSS 0.03%
  • Veröffentlicht 31.08.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 05:27:31

A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.

  • EPSS 0.11%
  • Veröffentlicht 18.06.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:34:45

The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the ...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 01.06.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:08:19

Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.

  • EPSS 0.44%
  • Veröffentlicht 10.03.2021 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:46:07

Libjpeg-turbo versions 2.0.91 and 2.0.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted GIF image.

Exploit
  • EPSS 0.5%
  • Veröffentlicht 03.06.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:01:51

libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.

Exploit
  • EPSS 0.29%
  • Veröffentlicht 18.07.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:25:47

In libjpeg-turbo 2.0.2, a large amount of memory can be used during processing of an invalid progressive JPEG image containing incorrect width and height values in the image header. NOTE: the vendor's expectation, for use cases in which this memory u...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 07.03.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:11

get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is o...

  • EPSS 0.33%
  • Veröffentlicht 21.12.2018 09:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:14

The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.