vulnerability
Microsoft Windows: CVE-2013-6629: libjpeg Information Disclosure Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Apr 11, 2017 | Apr 11, 2017 | Sep 5, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Apr 11, 2017
Added
Apr 11, 2017
Modified
Sep 5, 2025
Description
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
Solutions
microsoft-windows-windows_10-1507-kb4015221microsoft-windows-windows_10-1511-kb4015219microsoft-windows-windows_10-1607-kb4015217microsoft-windows-windows_10-1703-kb4015583microsoft-windows-windows_server_2012-kb4015548microsoft-windows-windows_server_2012_r2-kb4015547microsoft-windows-windows_server_2016-1607-kb4015217msft-kb4014652-2a064bd4-d156-43b3-8bda-7c79d2b0e95bmsft-kb4014652-3c7b77d8-eb05-4dea-8a4b-c613a608b2a3msft-kb4014652-6b03b6e1-3740-4a01-8da6-bc2c162367bamsft-kb4014652-6edbb8f0-b47b-41e6-ad0a-34f208f902e5msft-kb4014652-9835cb62-6aa9-4273-be97-3ec9652f33e5msft-kb4014794-047524b5-bfdb-478a-b2b3-d3fc10d0644fmsft-kb4014794-10bea756-ad89-43b7-83b5-32aaccaa42a7msft-kb4014794-2ee52151-0314-4b96-ae2a-a97d76070f86msft-kb4014794-3a420633-fabc-4eec-b88b-65f4ea75f4e4msft-kb4014794-46260329-51e7-491b-8208-0496dbf3056fmsft-kb4014794-daa8a8a6-2525-410a-99dd-bf0cc9f5c100msft-kb4015383-3942bd95-415a-4274-8d1d-68d944896a44msft-kb4015383-a50f3ec9-c56e-4759-a2ba-fb0102060912msft-kb4015383-ce52c030-1e9d-4b63-8a89-bc1b458c44afmsft-kb4015383-e0761ba4-45f4-4850-8c87-4e7d9c76752cmsft-kb4015383-e39d7235-ad7f-46e5-b72b-81304881ded2msft-kb4015383-eae71e38-51d8-45ad-af70-9a4b43ede40emsft-kb4015546-592c9a40-6bdc-4122-8496-0b4295cf7a86msft-kb4015546-61107fd4-8fba-4639-9c3a-d70a69936b4emsft-kb4015546-7026cec0-32bf-4488-b45a-838aa929c109msft-kb4015546-c77661d2-7566-4f86-943c-264545419691msft-kb4015546-cc8006a9-8438-45aa-a20d-cceef511098dmsft-kb4015546-e2e88e16-fd32-4c2e-8848-69817601c17bmsft-kb4015547-e0e5d08f-8c2b-4dcf-a8c9-36eb7c174896msft-kb4015547-eb001e30-98fe-4874-a0c9-436635649fddmsft-kb4015548-72db1a7d-338c-4903-9869-9fd8258b643amsft-kb4015548-d1986d38-72dd-4e1a-877e-70a3f77f7802msft-kb4017094-633a4cc1-35c9-40b9-9714-7cf158168751
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.