Description
Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.
References (2)
Core 2
Core References
Exploit, Issue Tracking, Patch, Third Party Advisory
https://github.com/Matthias-Wandel/jhead/issues/51
Scores
CVSS v3
9.8
EPSS
0.0012
EPSS Percentile
30.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-120
CWE-787
Status
published
Products (1)
jhead_project/jhead
3.06
Published
Jun 13, 2023
Tracked Since
Feb 18, 2026