The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
25 Nov 2025, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE |
Information
Published : 2013-11-19 04:50
Updated : 2025-11-25 17:50
NVD link : CVE-2013-6629
Mitre link : CVE-2013-6629
CVE.ORG link : CVE-2013-6629
JSON object : View
Products Affected
artifex
- gpl_ghostscript
debian
- debian_linux
opensuse
- opensuse
fedoraproject
- fedora
mozilla
- firefox
- seamonkey
- thunderbird
- chrome
canonical
- ubuntu_linux
oracle
- solaris
libjpeg-turbo
- libjpeg-turbo
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
