{"id":"UBUNTU-CVE-2024-2824","details":"A vulnerability was found in Matthias-Wandel jhead 3.08 and classified as critical. This issue affects the function PrintFormatNumber of the file exif.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257711.","modified":"2026-01-20T18:37:37.060480Z","published":"2024-03-22T18:15:00Z","upstream":["CVE-2024-2824"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-2824"},{"type":"REPORT","url":"https://github.com/Matthias-Wandel/jhead/issues/84"},{"type":"REPORT","url":"https://vuldb.com/?id.257711"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.257711"},{"type":"REPORT","url":"https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-2824"}],"affected":[{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:2.97-1+deb8u2ubuntu0.1~esm4?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:2.97-1","1:2.97-1+deb8u1build0.14.04.1","1:2.97-1+deb8u2build0.14.04.1~esm1","1:2.97-1+deb8u2ubuntu0.1~esm1","1:2.97-1+deb8u2ubuntu0.1~esm2","1:2.97-1+deb8u2ubuntu0.1~esm3","1:2.97-1+deb8u2ubuntu0.1~esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.97-1+deb8u2ubuntu0.1~esm4","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.00-4+deb9u1ubuntu0.1~esm4?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.00-1","1:3.00-2","1:3.00-3","1:3.00-4+deb9u1build0.16.04.1","1:3.00-4+deb9u1ubuntu0.1~esm1","1:3.00-4+deb9u1ubuntu0.1~esm2","1:3.00-4+deb9u1ubuntu0.1~esm3","1:3.00-4+deb9u1ubuntu0.1~esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.00-4+deb9u1ubuntu0.1~esm4","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.00-8~ubuntu0.2+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.00-4","1:3.00-5","1:3.00-6","1:3.00-8~build0.18.04.1","1:3.00-8~ubuntu0.1","1:3.00-8~ubuntu0.2","1:3.00-8~ubuntu0.2+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.00-8~ubuntu0.2+esm1","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.04-1ubuntu0.2+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.03-3","1:3.04-1","1:3.04-1ubuntu0.1","1:3.04-1ubuntu0.2","1:3.04-1ubuntu0.2+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.04-1ubuntu0.2+esm1","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.06.0.1-2ubuntu0.22.04.1+esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.04-6","1:3.06.0.1-2","1:3.06.0.1-2ubuntu0.22.04.1","1:3.06.0.1-2ubuntu0.22.04.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.06.0.1-2ubuntu0.22.04.1+esm1","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/jhead@1:3.08-2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.08-1","1:3.08-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.08-2","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}},{"package":{"name":"jhead","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/jhead@1:3.08-3?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.08-3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:3.08-3","binary_name":"jhead"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-2824.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]}