In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/uclouvain/openjpeg/issues/1044 | third party advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html | third party advisory mailing list |
https://www.debian.org/security/2019/dsa-4405 | third party advisory vendor advisory |
https://usn.ubuntu.com/4109-1/ | third party advisory vendor advisory |