Upstream information

CVE-2008-4575 at MITRE

Description

Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 435979 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.0
  • jhead-debuginfo >= 2.82-11.3
  • jhead-debugsource >= 2.82-11.3
openSUSE 11.0
  • jhead >= 2.82-11.3
openSUSE 11.1
  • jhead >= 2.84-1.24.1
  • jhead-debuginfo >= 2.84-1.24.1
  • jhead-debugsource >= 2.84-1.24.1
openSUSE 11.1
  • jhead >= 2.84-1.24.1
openSUSE Leap 42.1
  • jhead >= 3.00-3.2
Patchnames:
openSUSE Leap 42.1 GA jhead
openSUSE Leap 42.2
  • jhead >= 3.00-4.3
Patchnames:
openSUSE Leap 42.2 GA jhead
openSUSE Leap 42.3
  • jhead >= 3.00-6.1
Patchnames:
openSUSE Leap 42.3 GA jhead
openSUSE Tumbleweed
  • jhead >= 3.00-1.8
Patchnames:
openSUSE Tumbleweed GA jhead