CVE-2016-10506

Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
References
Link Resource
http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/731 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/732 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/777 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/778 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/779 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/780 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201710-26
http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/731 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/732 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/777 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/778 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/779 Issue Tracking Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/issues/780 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201710-26
Configurations

Configuration 1 (hide)

cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:44

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100573 - () http://www.securityfocus.com/bid/100573 -
References () https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/issues/731 - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/issues/731 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/issues/732 - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/issues/732 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/issues/777 - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/issues/777 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/issues/778 - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/issues/778 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/issues/779 - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/issues/779 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/issues/780 - Issue Tracking, Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/issues/780 - Issue Tracking, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201710-26 - () https://security.gentoo.org/glsa/201710-26 -

Information

Published : 2017-08-30 09:29

Updated : 2024-11-21 02:44


NVD link : CVE-2016-10506

Mitre link : CVE-2016-10506

CVE.ORG link : CVE-2016-10506


JSON object : View

Products Affected

uclouvain

  • openjpeg
CWE
CWE-369

Divide By Zero