The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
21 Jun 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mozilla seamonkey
Mozilla Fedoraproject fedora Canonical Libjpeg-turbo libjpeg-turbo Mozilla firefox Esr Opensuse Libjpeg-turbo Mozilla firefox Mozilla thunderbird Opensuse opensuse Fedoraproject Debian debian Linux Canonical ubuntu Linux Debian |
|
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/201606-03 - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2013/dsa-2799 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/56175 - Not Applicable | |
References | (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21672080 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-1804.html - Third Party Advisory | |
References | (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=258723 - Issue Tracking, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-2053-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/58974 - Not Applicable | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2014:0414 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2014:0413 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/59058 - Not Applicable | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://support.apple.com/kb/HT6163 - Third Party Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=140852974709252&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=891693 - Issue Tracking, Patch, Third Party Advisory | |
References | (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/63676 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:273 - Broken Link | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html - Third Party Advisory | |
References | (CONFIRM) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629 - Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://support.apple.com/kb/HT6150 - Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://www.ibm.com/support/docview.wss?uid=swg21675973 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-2060-1 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676746 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://advisories.mageia.org/MGASA-2013-0333.html - Third Party Advisory | |
References | (CONFIRM) http://bugs.ghostscript.com/show_bug.cgi?id=686980 - Issue Tracking, Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1029476 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://support.apple.com/kb/HT6162 - Third Party Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=140852886808946&w=2 - Issue Tracking, Mailing List, Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-1803.html - Third Party Advisory | |
References | (CONFIRM) http://www.mozilla.org/security/announce/2013/mfsa2013-116.html - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Third Party Advisory | |
References | (CONFIRM) https://src.chromium.org/viewvc/chrome?revision=229729&view=revision - Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-2052-1 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html - Mailing List, Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1029470 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html - Mailing List, Third Party Advisory | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201406-32.xml - Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:* cpe:2.3:a:artifex:gpl_ghostscript:-:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:* |
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* |
Information
Published : 2013-11-19 04:50
Updated : 2023-06-21 18:19
NVD link : CVE-2013-6629
Mitre link : CVE-2013-6629
JSON object : View
Products Affected
oracle
- solaris
debian
- debian_linux
fedoraproject
- fedora
canonical
- ubuntu_linux
mozilla
- seamonkey
- thunderbird
- firefox_esr
- firefox
- chrome
libjpeg-turbo
- libjpeg-turbo
opensuse
- opensuse
artifex
- gpl_ghostscript
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor