CVE-2013-6369
Published Apr 11, 2014
Last updated 8 years ago
Overview
- Description
- Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA43E6CF-EA31-4C93-8316-80C24F515E5D", "versionEndIncluding": "2.0" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "777925B5-F546-4DB0-8EEB-F7B70CDCAD26" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC857FAE-24BB-4F76-B64A-C044EBACCEB8" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91B6AF78-0C28-433A-8F81-8EBCBF3F6FD5" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32166006-3001-4A59-BE85-A26FD72B8256" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96FB0E70-F378-4388-B4D6-CAFE86566C11" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F878084-BBB2-4168-A9E6-75FABFB4E677" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D03F95B9-5731-4B06-A303-A0F5309BB2F8" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23BC9B9E-0BF6-4A77-975F-02A93DEC37F6" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECD7C688-C054-4529-AC11-478C0D8EF99E" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D63A023-876C-44B7-A059-5067FF2FBAD3" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC8F5C0E-F74C-461C-9499-AB6DCC3B752D" }, { "criteria": "cpe:2.3:a:cambridge_enterprise:jbig-kit:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87A12E46-1ED6-4E88-A3AE-1A1C93D6DF5A" } ], "operator": "OR" } ] } ]