SB2019123105 - Multiple vulnerabilities in libjpeg-turbo
Published: December 31, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when attempting to decompress JPEG images with unusual sampling factors as 4:4:4 JPEG images using tjDecompressToYUV2() or tjDecompressToYUVPlanes(). A remote attacker can create a specially crafted JPEG file, pass it to the affected application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Out-of-bounds write (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within tjDecompressToYUV2() and tjDecompressToYUVPlanes() functions when attempting to decompress grayscale JPEG images that were compressed with a sampling factor other than 1. A remote attacker can create a specially crafted JPEG file, pass it to the affected application, trigger out-of-bounds write and execute arbitrary code on the target system.
3) Integer overflow (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a signed integer overflow when attempting to decompress images with more than 715827882 pixels using the 64-bit C version of TJBench. A remote attacker can pass a specially crafted image to the application, trigger integer overflow and perform a denial of service attack.
4) Stack-based buffer overflow (CVE-ID: CVE-2020-17541)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the in the "transform" component in Libjpeg-turb. A remote attacker can create a specially crafted JPEG image, pass it to the affected aplication, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.