Summary
Florian Weimer of the Red Hat product security team discovered multiple buffer overflows in jbigkit, which could lead to the execution of arbitrary code when processing malformed images.
Solution
For the stable distribution (wheezy),
this problem has been fixed in version 2.0-2+deb7u1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your jbigkit packages.
Affected
jbigkit on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-6369 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities