Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-6630

EPSS 1.83% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-6630

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
libjpeg-turbo 内存损坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
libjpeg是一个包含JPEG解码以及JPEG编码等功能的C语言库。libjpeg-turbo是libjpeg的一个优化改进版本。 Google Chrome 31.0.1650.48之前的版本中使用的libjpeg-turbo库1.3.0及之前的版本中的jdmarker.c文件中的‘get_dht’函数中存在安全漏洞,该漏洞源于当处理Huffman表时,libjpeg-turbo库使用未初始化的内存。远程攻击者可借助特制的JPEG图像利用该漏洞从未初始化内存位置获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-6630

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-6630

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-11-15 · 22 CVEs total

CVE-2013-2032Mediawiki ‘Password Reset’安全绕过漏洞
CVE-2013-4557SPIP ‘ecran_securite.php’ PHP代码注入漏洞
CVE-2013-4556SPIP ‘editer_auteur.php’ 跨站脚本漏洞
CVE-2013-4555SPIP ‘logout.php’跨站请求伪造漏洞
CVE-2013-4551Xen 远程拒绝服务漏洞
CVE-2013-4510Tryton ‘main.py’任意文件写入漏洞
CVE-2013-4480Red Hat Satellite 权限许可和访问控制问题漏洞
CVE-2013-4425Pixmeo OsiriX Private Key 本地信息泄露漏洞
CVE-2013-4204Google WebRTC 跨站脚本漏洞
CVE-2013-2114MediaWiki 任意文件上传漏洞
CVE-2013-2061OpenVPN ‘openvpn_decrypt()’函数信息泄露漏洞
CVE-2013-0741ImageGen ‘font’参数跨站脚本漏洞
CVE-2013-2031Mediawiki ‘SVG’文件跨站脚本漏洞
CVE-2013-1057Ubuntu MAAS Server 本地提权漏洞
CVE-2013-6797WordPres Blue Wrench Video Widget插件跨站请求伪造漏洞
CVE-2013-6631Google Chrome ‘Channel::SendRTCPPacket’函数释放后重用漏洞
CVE-2013-6629libjpeg/libjpeg-turbo库内存损坏漏洞
CVE-2013-6042Softaculous Webuzo ‘user’参数跨站脚本漏洞
CVE-2013-5223D-Link DSL-2760U-BN 跨站脚本漏洞和HTML注入漏洞
CVE-2013-4519Beanbag Review Board 跨站脚本漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-6630

No comments yet


Leave a comment