Lucene search

K
amazonAmazonALAS-2019-1286
HistorySep 13, 2019 - 10:58 p.m.

Medium: libjpeg-turbo

2019-09-1322:58:00
alas.aws.amazon.com
160

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.5%

Issue Overview:

The cjpeg utility in libjpeg allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or execute arbitrary code via a crafted file.(CVE-2016-3616)

libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.(CVE-2018-11813)

An out-of-bounds read vulnerability has been discovered in libjpeg-turbo when reading one row of pixels of a PPM file. An attacker could use this flaw to crash the application and cause a denial of service.(CVE-2018-11214)

An out-of-bound read vulnerability has been discovered in libjpeg-turbo when reading one row of pixels of a PGM file. An attacker could use this flaw to crash the application and cause a denial of service.(CVE-2018-11213)

get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.(CVE-2018-14498)

A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.(CVE-2018-11212)

Affected Packages:

libjpeg-turbo

Issue Correction:
Run yum update libjpeg-turbo to update your system.

New Packages:

i686:  
    turbojpeg-devel-1.2.90-8.16.amzn1.i686  
    turbojpeg-1.2.90-8.16.amzn1.i686  
    libjpeg-turbo-utils-1.2.90-8.16.amzn1.i686  
    libjpeg-turbo-1.2.90-8.16.amzn1.i686  
    libjpeg-turbo-static-1.2.90-8.16.amzn1.i686  
    libjpeg-turbo-debuginfo-1.2.90-8.16.amzn1.i686  
    libjpeg-turbo-devel-1.2.90-8.16.amzn1.i686  
  
src:  
    libjpeg-turbo-1.2.90-8.16.amzn1.src  
  
x86_64:  
    libjpeg-turbo-static-1.2.90-8.16.amzn1.x86_64  
    libjpeg-turbo-devel-1.2.90-8.16.amzn1.x86_64  
    libjpeg-turbo-debuginfo-1.2.90-8.16.amzn1.x86_64  
    libjpeg-turbo-utils-1.2.90-8.16.amzn1.x86_64  
    libjpeg-turbo-1.2.90-8.16.amzn1.x86_64  
    turbojpeg-devel-1.2.90-8.16.amzn1.x86_64  
    turbojpeg-1.2.90-8.16.amzn1.x86_64  

Additional References

Red Hat: CVE-2016-3616, CVE-2018-11212, CVE-2018-11213, CVE-2018-11214, CVE-2018-11813, CVE-2018-14498

Mitre: CVE-2016-3616, CVE-2018-11212, CVE-2018-11213, CVE-2018-11214, CVE-2018-11813, CVE-2018-14498

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.5%