Search for vulnerabilities
Vulnerability details: VCID-2qrt-twgz-2yhx
Vulnerability ID VCID-2qrt-twgz-2yhx
Aliases CVE-2013-6629
Summary Google security researcher Michal Zalewski reported issues with JPEG format image processing with Start Of Scan (SOS) and Define Huffman Table (DHT) markers in the libjpeg library. This could allow for the possible reading of arbitrary memory content as well as cross-domain image theft.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6629.json
https://api.first.org/data/v1/epss?cve=CVE-2013-6629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1031734 https://bugzilla.redhat.com/show_bug.cgi?id=1031734
729867 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729867
CVE-2013-6629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
mfsa2013-116 https://www.mozilla.org/en-US/security/advisories/mfsa2013-116
RHSA-2013:1803 https://access.redhat.com/errata/RHSA-2013:1803
RHSA-2013:1804 https://access.redhat.com/errata/RHSA-2013:1804
RHSA-2014:0412 https://access.redhat.com/errata/RHSA-2014:0412
RHSA-2014:0413 https://access.redhat.com/errata/RHSA-2014:0413
RHSA-2014:0486 https://access.redhat.com/errata/RHSA-2014:0486
RHSA-2014:0508 https://access.redhat.com/errata/RHSA-2014:0508
RHSA-2014:0509 https://access.redhat.com/errata/RHSA-2014:0509
RHSA-2014:0705 https://access.redhat.com/errata/RHSA-2014:0705
RHSA-2014:0982 https://access.redhat.com/errata/RHSA-2014:0982
USN-2052-1 https://usn.ubuntu.com/2052-1/
USN-2053-1 https://usn.ubuntu.com/2053-1/
USN-2060-1 https://usn.ubuntu.com/2060-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.43652
EPSS Score 0.0021
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:10:16.653004+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2013/mfsa2013-116.md 37.0.0