CVE-2012-2806
Published: August 13, 2012Last modified: July 22, 2025
Description
Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.8 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | libjpeg-turbo | Not affected (2.1.4-r0) |
| Stream | libjpeg-turbo | Not affected (3.0.0-r1) | |
| Hardened Containers | 23 LTS | libjpeg-turbo | Not affected (2.1.4-r0) |
| Stream | libjpeg-turbo | Not affected (3.0.0-r1) |
References
- http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830
- http://osvdb.org/84040
- http://secunia.com/advisories/49883
- http://secunia.com/advisories/50753
- http://security.gentoo.org/glsa/glsa-201209-13.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:121
- http://www.openwall.com/lists/oss-security/2012/07/17/3
- http://www.securityfocus.com/bid/54480
- https://bugzilla.mozilla.org/show_bug.cgi?id=759802
- https://bugzilla.redhat.com/show_bug.cgi?id=826849
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76952