CVE-2006-3005

Summary

CVECVE-2006-3005
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2006-06-13 10:02:00 UTC
Updated2017-07-20 01:31:00 UTC
DescriptionThe JPEG library in media-libs/jpeg before 6b-r7 on Gentoo Linux is built without the -maxmem feature, which could allow context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted JPEG file that exceeds the intended memory limits.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Gentoo Linux All All All All
Operating System Gentoo Linux All All All All
Application Gentoo Media-libs Jpeg 6b r2 All All
Application Gentoo Media-libs Jpeg 6b r3 All All
Application Gentoo Media-libs Jpeg 6b r4 All All
Application Gentoo Media-libs Jpeg 6b r5 All All
Application Gentoo Media-libs Jpeg 6b r6 All All
Application Gentoo Media-libs Jpeg 6b r2 All All
Application Gentoo Media-libs Jpeg 6b r3 All All
Application Gentoo Media-libs Jpeg 6b r4 All All
Application Gentoo Media-libs Jpeg 6b r5 All All
Application Gentoo Media-libs Jpeg 6b r6 All All

References

ReferenceSourceLinkTags
Secunia - Advisories - Gentoo update for jpeg SECUNIA secunia.com Patch, Vendor Advisory
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Gentoo Linux Documentation -- JPEG library: Denial of Service GENTOO www.gentoo.org Patch, Vendor Advisory
Gentoo Bug 130889 - media-libs/jpeg: maxmem feature not used (DoS via memory exhaustion) CONFIRM bugs.gentoo.org
26317 OSVDB www.osvdb.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2006-08-24Mark J CoxRed Hat does not consider this a security issue. It is expected behavior that a large input file will cause the processing program to use a large amount of memory.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report