Description
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
References (21)
Core 21
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/106583
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3706-2/
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0474
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3706-1/
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0469
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0473
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0472
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0640
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:1238
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2052
Patch, Third Party Advisory x_refsource_confirm
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Patch, Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190118-0001/
Exploit, Third Party Advisory x_refsource_misc
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a
Various Sources x_refsource_misc
http://www.ijg.org/
Vendor Advisory x_refsource_confirm
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
Various Sources x_refsource_misc
https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git
Vendor Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2022.html
Scores
CVSS v3
6.5
EPSS
0.0257
EPSS Percentile
85.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-369
Status
published
Products (23)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
debian/debian_linux
8.0
ijg/libjpeg
9a
netapp/oncommand_unified_manager
netapp/oncommand_unified_manager
7.3
netapp/oncommand_unified_manager
9.4
netapp/oncommand_workflow_automation
... and 13 more
Published
May 16, 2018
Tracked Since
Feb 18, 2026