GLSA-201612-55 : libjpeg-turbo: User-assisted execution of arbitrary code

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201612-55
(libjpeg-turbo: User-assisted execution of arbitrary code)

The accelerated Huffman decoder was previously invoked if there were 128
bytes in the input buffer. However, it is possible to construct a JPEG
image with Huffman blocks > 430 bytes in length. This release simply
increases the minimum buffer size for the accelerated Huffman decoder to
512 bytes, which should accommodate any possible input.

Impact :

A remote attacker could coerce the victim to run a specially crafted
image file resulting in the execution of arbitrary code.

Workaround :

There is no known workaround at this time.

See also :

https://wiki.mozilla.org/images/7/77/Libjpeg-turbo-report.pdf
http://www.nessus.org/u?66e8f916
https://security.gentoo.org/glsa/201612-55

Solution :

All libjpeg-turbo users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/libjpeg-turbo-1.5.0'

Risk factor :

Medium

Family: Gentoo Local Security Checks

Nessus Plugin ID: 96230 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now