Heap-based buffer overflow vulnerability in the opj_mqc_byteout function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-4013 | |
http://www.securityfocus.com/bid/100564 | |
https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04 | Issue Tracking Patch Third Party Advisory |
https://github.com/uclouvain/openjpeg/issues/835 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201710-26 | |
https://www.exploit-db.com/exploits/42600/ | |
http://www.debian.org/security/2017/dsa-4013 | |
http://www.securityfocus.com/bid/100564 | |
https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04 | Issue Tracking Patch Third Party Advisory |
https://github.com/uclouvain/openjpeg/issues/835 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201710-26 | |
https://www.exploit-db.com/exploits/42600/ |
Configurations
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-4013 - | |
References | () http://www.securityfocus.com/bid/100564 - | |
References | () https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/uclouvain/openjpeg/issues/835 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201710-26 - | |
References | () https://www.exploit-db.com/exploits/42600/ - |
Information
Published : 2017-08-30 09:29
Updated : 2024-11-21 02:44
NVD link : CVE-2016-10504
Mitre link : CVE-2016-10504
CVE.ORG link : CVE-2016-10504
JSON object : View
Products Affected
uclouvain
- openjpeg
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer