An invalid write access was discovered in bin/jp2/convert.c in OpenJPEG 2.2.0, triggering a crash in the tgatoimage function. The vulnerability may lead to remote denial of service or possibly unspecified other impact.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://blogs.gentoo.org/ago/2017/08/28/openjpeg-invalid-memory-write-in-tgatoimage-convert-c/ | vdb entry third party advisory patch |
https://github.com/uclouvain/openjpeg/issues/995 | issue tracking third party advisory patch |
http://www.debian.org/security/2017/dsa-4013 | third party advisory vendor advisory |
https://github.com/uclouvain/openjpeg/commit/2cd30c2b06ce332dede81cccad8b334cde997281 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/100553 | vdb entry third party advisory |