An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/uclouvain/openjpeg/issues/862 | third party advisory exploit |
https://security.gentoo.org/glsa/201710-26 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/97073 | vdb entry third party advisory |
https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d | third party advisory patch |
http://rhn.redhat.com/errata/RHSA-2017-0838.html | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573 | issue tracking patch exploit third party advisory |
https://www.debian.org/security/2017/dsa-3768 | third party advisory vendor advisory |