{"id": "CVE-2021-27804", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-27804", "description": "JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption.", "published": "2021-03-02T01:15:00", "modified": "2021-06-21T13:41:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27804", "reporter": "cve@mitre.org", "references": ["https://gitlab.com/wg1/jpeg-xl/-/tags", "http://www.openwall.com/lists/oss-security/2021/03/01/3", "http://seclists.org/fulldisclosure/2021/Mar/2", "http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html"], "cvelist": ["CVE-2021-27804"], "immutableFields": [], "lastseen": "2022-03-23T16:15:23", "viewCount": 67, "enchantments": {"dependencies": {"references": [{"type": "zdt", "idList": ["1337DAY-ID-35895"]}], "rev": 4}, "score": {"value": 3.4, "vector": "NONE"}, "twitter": {"counter": 4, "modified": "2021-03-04T16:37:11", "tweets": [{"link": "https://twitter.com/WolfgangSesin/status/1367963317956927498", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-27804 (jpeg_xl)) has been published on https://t.co/f1tEpPiUpX?amp=1"}, {"link": "https://twitter.com/www_sesin_at/status/1367963303268474881", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-27804 (jpeg_xl)) has been published on https://t.co/LTVL2OTLT8?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1366679865362153472", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (JPEG XL up to 0.3.2 memory corruption [CVE-2021-27804]) has been published on https://t.co/qJpaTzykiF?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1366679865362153472", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (JPEG XL up to 0.3.2 memory corruption [CVE-2021-27804]) has been published on https://t.co/qJpaTzykiF?amp=1"}]}, "backreferences": {"references": [{"type": "zdt", "idList": ["1337DAY-ID-35895"]}]}, "exploitation": null, "vulnersScore": 3.4}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:libjxl_project:libjxl:0.3.2"], "cpe23": ["cpe:2.3:a:libjxl_project:libjxl:0.3.2:*:*:*:*:*:*:*"], "cwe": ["CWE-787"], "affectedSoftware": [{"cpeName": "libjxl_project:libjxl", "version": "0.3.2", "operator": "le", "name": "libjxl project libjxl"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:libjxl_project:libjxl:0.3.2:*:*:*:*:*:*:*", "versionEndIncluding": "0.3.2", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://gitlab.com/wg1/jpeg-xl/-/tags", "name": "https://gitlab.com/wg1/jpeg-xl/-/tags", "refsource": "MISC", "tags": ["Third Party Advisory"]}, {"url": "http://www.openwall.com/lists/oss-security/2021/03/01/3", "name": "http://www.openwall.com/lists/oss-security/2021/03/01/3", "refsource": "MISC", "tags": ["Mailing List", "Third Party Advisory"]}, {"url": "http://seclists.org/fulldisclosure/2021/Mar/2", "name": "20210302 Multiple Vulnerabilities in jpeg-xl (CVE-2021-27804)", "refsource": "FULLDISC", "tags": ["Third Party Advisory"]}, {"url": "http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html", "name": "http://packetstormsecurity.com/files/161623/jpeg-xl-0.3.1-Memory-Corruption.html", "refsource": "MISC", "tags": ["Third Party Advisory"]}]}
{"zdt": [{"lastseen": "2021-12-23T05:51:59", "description": "", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-03-03T00:00:00", "type": "zdt", "title": "jpeg-xl 0.3.1 Memory Corruption Vulnerability", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27804"], "modified": "2021-03-03T00:00:00", "id": "1337DAY-ID-35895", "href": "https://0day.today/exploit/description/35895", "sourceData": "Multiple Vulnerabilities in jpeg-xl\n===================================\nCVE: CVE-2021-27804\nHighest Severity Rating: High\nConfirmed Affected Versions: jpeg-xl v0.3.1 and earlier\nVendor: Joint Photographic Experts Group (JPEG)\nVendor URL: https://gitlab.com/wg1/jpeg-xl\n\n\nSummary and Impact\n------------------\njpeg-xl is the reference implementation by the Joint Photographic\nExperts Group (JPEG) of the new JPEG XL standard.\nMultiple memory corruption vulnerabilities were found and reported in\nthe last 3 months. The security issues were responsively reported to\nthe vendor and were fixed in subsequent version, however silently.\n\nThe changelog does not reflect security issues being fixed:\n\njpeg-xl (0.3.2) urgency=medium\n\n * Bump JPEG XL version to 0.3.2.\n * Fix embedded ICC encoding regression #149.\n\n -- Fri, 12 Feb 2021 21:00:12 +0100\n\njpeg-xl (0.3.1) urgency=medium\n\n * Bump JPEG XL version to 0.3.1.\n\n -- Tue, 09 Feb 2021 09:48:43 +0100\n\njpeg-xl (0.3) urgency=medium\n\n * Bump JPEG XL version to 0.3.\n\n -- Wed, 27 Jan 2021 22:36:32 +0100\n\nAll the while it is already being available e.g. in Arch Linux\n(https://aur.archlinux.org/packages/libjpeg-xl-git/) and FreeBSD\n(https://pkgs.org/download/jpeg-xl) and is currently in the process of\nbeing added to Debian and therefore to Ubuntu and Kali Linux.\n\nHence the need to sit down and write a boring advisory to publish on a\nmailing list instead of doing something more interesting :(\n\nFor anyone interested, the memory corruptions were discovered by using\nthe AFL++ fuzzer (https://github.com/AFLplusplus/AFLplusplus) for just a\nfew hours for testing purposes. The current v0.3.2 release of jpeg-xl\nalso produces writeable memory corruptions when fuzzing for a very short\ntime (with a good starting corpus that is).\n\n\nRecommendation\n--------------\nThe vendor should establish a proper notification on fixed security\nissues in the changelog and not put the Internet at risk.\n", "sourceHref": "https://0day.today/exploit/35895", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}