CVE Vulnerabilities

CVE-2020-14152

Uncontrolled Resource Consumption

Published: Jun 15, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
7.1 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnobs.c in djpeg does not honor the max_memory_to_use setting, possibly causing excessive memory consumption.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
LibjpegIjg*9d (excluding)
Libjpeg-turboUbuntuesm-infra-legacy/trusty*
Libjpeg-turboUbuntuesm-infra/xenial*
Libjpeg-turboUbuntuprecise/esm*
Libjpeg-turboUbuntutrusty*
Libjpeg-turboUbuntutrusty/esm*
Libjpeg-turboUbuntuupstream*
Libjpeg-turboUbuntuxenial*
Libjpeg6bUbuntubionic*
Libjpeg6bUbuntudevel*
Libjpeg6bUbuntueoan*
Libjpeg6bUbuntuesm-apps/bionic*
Libjpeg6bUbuntuesm-apps/focal*
Libjpeg6bUbuntuesm-apps/jammy*
Libjpeg6bUbuntuesm-apps/noble*
Libjpeg6bUbuntuesm-apps/xenial*
Libjpeg6bUbuntuesm-infra-legacy/trusty*
Libjpeg6bUbuntufocal*
Libjpeg6bUbuntugroovy*
Libjpeg6bUbuntuhirsute*
Libjpeg6bUbuntuimpish*
Libjpeg6bUbuntujammy*
Libjpeg6bUbuntukinetic*
Libjpeg6bUbuntulunar*
Libjpeg6bUbuntumantic*
Libjpeg6bUbuntunoble*
Libjpeg6bUbuntuoracular*
Libjpeg6bUbuntuplucky*
Libjpeg6bUbuntuquesting*
Libjpeg6bUbuntutrusty*
Libjpeg6bUbuntutrusty/esm*
Libjpeg6bUbuntuupstream*
Libjpeg6bUbuntuxenial*
Libjpeg9Ubuntubionic*
Libjpeg9Ubuntueoan*
Libjpeg9Ubuntuesm-apps/bionic*
Libjpeg9Ubuntuesm-apps/xenial*
Libjpeg9Ubuntutrusty*
Libjpeg9Ubuntuupstream*
Libjpeg9Ubuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References