OpenJPEG is prone to the following vulnerabilities:
1. Multiple denial-of-service vulnerabilities
2. An integer-overflow vulnerability
Attackers can exploit these issues to cause the application to crash or execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions.
OpenJPEG version 2.3.0 and prior are vulnerable; other versions may also be affected.
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Bugtraq ID: | 108921 |
Class: | Boundary Condition Error |
CVE: | CVE-2018-20845 CVE-2018-20846 CVE-2018-20847 |
Remote: | Yes |
Local: | No |
Published: | Jun 26 2019 12:00AM |
Updated: | Jun 26 2019 12:00AM |
Credit: | The vendor reported these issues. |
Vulnerable: | OpenJPEG OpenJPEG 2.3 OpenJPEG OpenJPEG 2.1.2 OpenJPEG OpenJPEG 2.1.1 OpenJPEG OpenJPEG 2.1 OpenJPEG OpenJPEG 1.5 OpenJPEG OpenJPEG 2.2.0 OpenJPEG OpenJPEG 2.0.0 OpenJPEG OpenJPEG 1.5.2 OpenJPEG OpenJPEG 1.5.1 OpenJPEG OpenJPEG 1.5 OpenJPEG OpenJPEG 1.4 OpenJPEG OpenJPEG 1.3 OpenJPEG OpenJPEG 1.0 |
Not Vulnerable: |
References:
- [MJ2] To avoid divisions by zero / undefined behaviour on shift (uclouvain/openjpeg)
- [trunk] fixed a buffer overflow in opj_tcd_init_decode_tile (uclouvain/openjpeg)
- Fix multiple potential vulnerabilities and bugs #1168 (uclouvain/openjpeg)
- Fix multiple potential vulnerabilities and bugs #1168 (uclouvain/openjpeg)
- Heap-buffer-overflow in opj_tcd_init_decode_tile #431 (uclouvain/openjpeg)
- OpenJPEG Homepage (OpenJPEG)
from SecurityFocus Vulnerabilities https://ift.tt/2KKK9VM
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.