CVE-2018-11212

An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.ijg.org/
http://www.securityfocus.com/bid/106583 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0469 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0472 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0473 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0474 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0640 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:2052
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a Exploit Third Party Advisory
https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git
https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20190118-0001/ Patch Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
https://usn.ubuntu.com/3706-1/ Third Party Advisory
https://usn.ubuntu.com/3706-2/ Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.ijg.org/
http://www.securityfocus.com/bid/106583 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0469 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0472 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0473 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0474 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0640 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:2052
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a Exploit Third Party Advisory
https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git
https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20190118-0001/ Patch Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
https://usn.ubuntu.com/3706-1/ Third Party Advisory
https://usn.ubuntu.com/3706-2/ Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ijg:libjpeg:9a:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*

Configuration 5 (hide)

OR cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:8.0:update_191:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html - () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html -
References () http://www.ijg.org/ - () http://www.ijg.org/ -
References () http://www.securityfocus.com/bid/106583 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106583 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:0469 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0469 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0472 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0472 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0473 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0473 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0474 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0474 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0640 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0640 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1238 - () https://access.redhat.com/errata/RHSA-2019:1238 -
References () https://access.redhat.com/errata/RHSA-2019:2052 - () https://access.redhat.com/errata/RHSA-2019:2052 -
References () https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a - Exploit, Third Party Advisory () https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a - Exploit, Third Party Advisory
References () https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git - () https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git -
References () https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190118-0001/ - Patch, Third Party Advisory () https://security.netapp.com/advisory/ntap-20190118-0001/ - Patch, Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us - () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us -
References () https://usn.ubuntu.com/3706-1/ - Third Party Advisory () https://usn.ubuntu.com/3706-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3706-2/ - Third Party Advisory () https://usn.ubuntu.com/3706-2/ - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - () https://www.oracle.com/security-alerts/cpuapr2022.html -
References () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory

Information

Published : 2018-05-16 17:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11212

Mitre link : CVE-2018-11212

CVE.ORG link : CVE-2018-11212


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • satellite
  • enterprise_linux_workstation

ijg

  • libjpeg

netapp

  • oncommand_unified_manager
  • snapmanager
  • oncommand_workflow_automation

canonical

  • ubuntu_linux

oracle

  • jdk
  • jre

opensuse

  • leap

debian

  • debian_linux
CWE
CWE-369

Divide By Zero