7.8
CVSSv3

CVE-2022-41751

Published: 17/10/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Jhead 3.06.0.1 allows malicious users to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jhead project jhead 3.06.0.1

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1022028 jhead: CVE-2022-41751 Package: src:jhead; Maintainer for src:jhead is Joachim Reichel <reichel@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 19 Oct 2022 07:57:04 UTC Severity: grave Tags: security, upstream Found in version jhead/1:30601-2 Forwa ...
Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option In addition a buffer overflow error in exifc has been addressed which could lead to a denial of service (application crash) For the ...