vulnerability

Microsoft Windows: CVE-2013-6629: libjpeg Information Disclosure Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Apr 11, 2017
Added
Apr 11, 2017
Modified
Sep 5, 2025

Description

The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.

Solutions

microsoft-windows-windows_10-1507-kb4015221microsoft-windows-windows_10-1511-kb4015219microsoft-windows-windows_10-1607-kb4015217microsoft-windows-windows_10-1703-kb4015583microsoft-windows-windows_server_2012-kb4015548microsoft-windows-windows_server_2012_r2-kb4015547microsoft-windows-windows_server_2016-1607-kb4015217msft-kb4014652-2a064bd4-d156-43b3-8bda-7c79d2b0e95bmsft-kb4014652-3c7b77d8-eb05-4dea-8a4b-c613a608b2a3msft-kb4014652-6b03b6e1-3740-4a01-8da6-bc2c162367bamsft-kb4014652-6edbb8f0-b47b-41e6-ad0a-34f208f902e5msft-kb4014652-9835cb62-6aa9-4273-be97-3ec9652f33e5msft-kb4014794-047524b5-bfdb-478a-b2b3-d3fc10d0644fmsft-kb4014794-10bea756-ad89-43b7-83b5-32aaccaa42a7msft-kb4014794-2ee52151-0314-4b96-ae2a-a97d76070f86msft-kb4014794-3a420633-fabc-4eec-b88b-65f4ea75f4e4msft-kb4014794-46260329-51e7-491b-8208-0496dbf3056fmsft-kb4014794-daa8a8a6-2525-410a-99dd-bf0cc9f5c100msft-kb4015383-3942bd95-415a-4274-8d1d-68d944896a44msft-kb4015383-a50f3ec9-c56e-4759-a2ba-fb0102060912msft-kb4015383-ce52c030-1e9d-4b63-8a89-bc1b458c44afmsft-kb4015383-e0761ba4-45f4-4850-8c87-4e7d9c76752cmsft-kb4015383-e39d7235-ad7f-46e5-b72b-81304881ded2msft-kb4015383-eae71e38-51d8-45ad-af70-9a4b43ede40emsft-kb4015546-592c9a40-6bdc-4122-8496-0b4295cf7a86msft-kb4015546-61107fd4-8fba-4639-9c3a-d70a69936b4emsft-kb4015546-7026cec0-32bf-4488-b45a-838aa929c109msft-kb4015546-c77661d2-7566-4f86-943c-264545419691msft-kb4015546-cc8006a9-8438-45aa-a20d-cceef511098dmsft-kb4015546-e2e88e16-fd32-4c2e-8848-69817601c17bmsft-kb4015547-e0e5d08f-8c2b-4dcf-a8c9-36eb7c174896msft-kb4015547-eb001e30-98fe-4874-a0c9-436635649fddmsft-kb4015548-72db1a7d-338c-4903-9869-9fd8258b643amsft-kb4015548-d1986d38-72dd-4e1a-877e-70a3f77f7802msft-kb4017094-633a4cc1-35c9-40b9-9714-7cf158168751

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.