Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2013-6629: libjpeg Information Disclosure Vulnerability

Back to Search

Microsoft CVE-2013-6629: libjpeg Information Disclosure Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
04/11/2017
Created
07/25/2018
Added
04/11/2017
Modified
08/23/2019

Description

An information disclosure vulnerability exists within the open-source libjpeg image-processing library where it fails to properly handle objects in memory, allowing an attacker to retrieve information that could lead to an Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited this vulnerability could cause information to be disclosed that could allow for bypassing the ASLR security feature that protects users from a broad class of vulnerabilities. The security feature bypass itself does not allow arbitrary code execution. However, an attacker could use the ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code. To exploit this vulnerability, an attacker could convince a user to run a specially crafted application. The security update addresses the vulnerability by correcting how libjpeg handles objects in memory.

Solution(s)

  • msft-kb4014652-2a064bd4-d156-43b3-8bda-7c79d2b0e95b
  • msft-kb4014652-3c7b77d8-eb05-4dea-8a4b-c613a608b2a3
  • msft-kb4014652-6b03b6e1-3740-4a01-8da6-bc2c162367ba
  • msft-kb4014652-6edbb8f0-b47b-41e6-ad0a-34f208f902e5
  • msft-kb4014652-9835cb62-6aa9-4273-be97-3ec9652f33e5
  • msft-kb4014794-047524b5-bfdb-478a-b2b3-d3fc10d0644f
  • msft-kb4014794-10bea756-ad89-43b7-83b5-32aaccaa42a7
  • msft-kb4014794-2ee52151-0314-4b96-ae2a-a97d76070f86
  • msft-kb4014794-3a420633-fabc-4eec-b88b-65f4ea75f4e4
  • msft-kb4014794-46260329-51e7-491b-8208-0496dbf3056f
  • msft-kb4014794-daa8a8a6-2525-410a-99dd-bf0cc9f5c100
  • msft-kb4015217-455d76f1-ba4b-48e6-80a2-aaedf9dbf6ed
  • msft-kb4015217-4a4cfa3f-337e-496e-9d32-a143afcb27f4
  • msft-kb4015217-573050f8-8958-4f78-bf90-019ef167a2c0
  • msft-kb4015219-9543acec-5076-4c61-bf83-e4a710166548
  • msft-kb4015219-a1b819d9-d5d2-4b33-ae8c-444fcf07063a
  • msft-kb4015221-9827321e-56c9-4c7a-9753-b8d250d58183
  • msft-kb4015221-99f960a7-07f7-478d-bd16-686208928c61
  • msft-kb4015383-3942bd95-415a-4274-8d1d-68d944896a44
  • msft-kb4015383-a50f3ec9-c56e-4759-a2ba-fb0102060912
  • msft-kb4015383-ce52c030-1e9d-4b63-8a89-bc1b458c44af
  • msft-kb4015383-e0761ba4-45f4-4850-8c87-4e7d9c76752c
  • msft-kb4015383-e39d7235-ad7f-46e5-b72b-81304881ded2
  • msft-kb4015383-eae71e38-51d8-45ad-af70-9a4b43ede40e
  • msft-kb4015546-592c9a40-6bdc-4122-8496-0b4295cf7a86
  • msft-kb4015546-61107fd4-8fba-4639-9c3a-d70a69936b4e
  • msft-kb4015546-7026cec0-32bf-4488-b45a-838aa929c109
  • msft-kb4015546-c77661d2-7566-4f86-943c-264545419691
  • msft-kb4015546-cc8006a9-8438-45aa-a20d-cceef511098d
  • msft-kb4015546-e2e88e16-fd32-4c2e-8848-69817601c17b
  • msft-kb4015547-79629e4e-67eb-438d-9420-17c673012731
  • msft-kb4015547-e0e5d08f-8c2b-4dcf-a8c9-36eb7c174896
  • msft-kb4015547-eb001e30-98fe-4874-a0c9-436635649fdd
  • msft-kb4015548-31ca69ca-ca73-4405-860b-037051bd1984
  • msft-kb4015548-72db1a7d-338c-4903-9869-9fd8258b643a
  • msft-kb4015548-d1986d38-72dd-4e1a-877e-70a3f77f7802
  • msft-kb4015583-184f9486-a9fd-46f9-9f83-0a07c0c939ea
  • msft-kb4015583-4816e53b-6f86-43c5-a740-0cafbe6317f5
  • msft-kb4017094-633a4cc1-35c9-40b9-9714-7cf158168751

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;