Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-6629

EPSS 0.21% · P43
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-6629

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
libjpeg/libjpeg-turbo库内存损坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
libjpeg是一个包含JPEG解码以及JPEG编码等功能的C语言库。libjpeg-turbo是libjpeg的一个优化改进版本。 Google Chrome 31.0.1650.48之前的版本和Ghostscript软件中使用的libjpeg 6b和libjpeg-turbo 1.3.0及之前的版本中的jdmarker.c文件中的‘get_sos’函数中存在安全漏洞,该漏洞源于程序没有检查重复的组件数据。远程攻击者可借助特制的JPEG图像利用该漏洞获取未初始化内存位置的敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-6629

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-6629

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-11-15 · 22 CVEs total

CVE-2013-2032Mediawiki ‘Password Reset’安全绕过漏洞
CVE-2013-4557SPIP ‘ecran_securite.php’ PHP代码注入漏洞
CVE-2013-4556SPIP ‘editer_auteur.php’ 跨站脚本漏洞
CVE-2013-4555SPIP ‘logout.php’跨站请求伪造漏洞
CVE-2013-4551Xen 远程拒绝服务漏洞
CVE-2013-4510Tryton ‘main.py’任意文件写入漏洞
CVE-2013-4480Red Hat Satellite 权限许可和访问控制问题漏洞
CVE-2013-4425Pixmeo OsiriX Private Key 本地信息泄露漏洞
CVE-2013-4204Google WebRTC 跨站脚本漏洞
CVE-2013-2114MediaWiki 任意文件上传漏洞
CVE-2013-2061OpenVPN ‘openvpn_decrypt()’函数信息泄露漏洞
CVE-2013-0741ImageGen ‘font’参数跨站脚本漏洞
CVE-2013-2031Mediawiki ‘SVG’文件跨站脚本漏洞
CVE-2013-1057Ubuntu MAAS Server 本地提权漏洞
CVE-2013-6797WordPres Blue Wrench Video Widget插件跨站请求伪造漏洞
CVE-2013-6631Google Chrome ‘Channel::SendRTCPPacket’函数释放后重用漏洞
CVE-2013-6630libjpeg-turbo 内存损坏漏洞
CVE-2013-6042Softaculous Webuzo ‘user’参数跨站脚本漏洞
CVE-2013-5223D-Link DSL-2760U-BN 跨站脚本漏洞和HTML注入漏洞
CVE-2013-4519Beanbag Review Board 跨站脚本漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-6629

No comments yet


Leave a comment