In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/12/msg00013.html | third party advisory mailing list |
https://www.debian.org/security/2019/dsa-4405 | third party advisory vendor advisory |
https://usn.ubuntu.com/4109-1/ | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | third party advisory |
https://github.com/uclouvain/openjpeg/issues/1059 | third party advisory exploit |