CVE-2021-28276
Ubuntu Security Notice USN-6098-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a wild address read in the ProcessCanonMakerNoteDir function in makernote.c.
Se presenta una vulnerabilidad de denegación de servicio en jhead versiones 3.04 y 3.05, por medio de una lectura de una dirección salvaje en la función ProcessCanonMakerNoteDir en el archivo makernote.c
It was discovered that Jhead did not properly handle certain crafted images while processing the JFIF markers. An attacker could cause Jhead to crash. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS. It was discovered that Jhead did not properly handle certain crafted images while processing longitude tags. An attacker could cause Jhead to crash. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-12 CVE Reserved
- 2022-03-23 CVE Published
- 2024-08-03 CVE Updated
- 2025-04-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Matthias-Wandel/jhead/issues/1 | 2022-11-16 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202210-17 | 2022-11-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jhead Project Search vendor "Jhead Project" | Jhead Search vendor "Jhead Project" for product "Jhead" | 3.04 Search vendor "Jhead Project" for product "Jhead" and version "3.04" | - |
Affected
| ||||||
Jhead Project Search vendor "Jhead Project" | Jhead Search vendor "Jhead Project" for product "Jhead" | 3.05 Search vendor "Jhead Project" for product "Jhead" and version "3.05" | - |
Affected
|