CVE-2018-16554

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jhead_project:jhead:3.00:*:*:*:*:*:*:*

History

21 Nov 2024, 03:52

Type Values Removed Values Added
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176 - Exploit, Mailing List, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176 - Exploit, Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html - () https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html -
References () https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more - Exploit, Patch, Third Party Advisory () https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more - Exploit, Patch, Third Party Advisory

Information

Published : 2018-09-16 02:29

Updated : 2024-11-21 03:52


NVD link : CVE-2018-16554

Mitre link : CVE-2018-16554

CVE.ORG link : CVE-2018-16554


JSON object : View

Products Affected

jhead_project

  • jhead
CWE
CWE-134

Use of Externally-Controlled Format String