{ "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "jhead", "version": { "version_data": [ { "version_value": "3.03" } ] } } ] }, "vendor_name": "jhead" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679952", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1679952" }, { "refsource": "CONFIRM", "name": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251", "url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251" }, { "refsource": "MISC", "name": "https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo", "url": "https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo" }, { "refsource": "FEDORA", "name": "FEDORA-2019-17b95fecd3", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WVQTORTGQE56XXC6OVHQCSCUGABRMQZ/" }, { "refsource": "FEDORA", "name": "FEDORA-2019-441c2fb0d1", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTGUHTJTQ6EKEPDXFSKZKVLUJC4UAPBQ/" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update", "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00037.html" }, { "refsource": "GENTOO", "name": "GLSA-202007-17", "url": "https://security.gentoo.org/glsa/202007-17" } ] } }