CVE-2016-1626

The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

07 Nov 2023, 02:30

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/201603-09 - () https://security.gentoo.org/glsa/201603-09 -
References (SECTRACK) http://www.securitytracker.com/id/1035183 - () http://www.securitytracker.com/id/1035183 -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html - () http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=571480 - () https://code.google.com/p/chromium/issues/detail?id=571480 -
References (GENTOO) https://security.gentoo.org/glsa/201710-26 - () https://security.gentoo.org/glsa/201710-26 -
References (DEBIAN) http://www.debian.org/security/2016/dsa-3486 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3486 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-0241.html - () http://rhn.redhat.com/errata/RHSA-2016-0241.html -
References (CONFIRM) https://codereview.chromium.org/1583233008 - () https://codereview.chromium.org/1583233008 -
References (MISC) http://www.zerodayinitiative.com/advisories/ZDI-16-171 - () http://www.zerodayinitiative.com/advisories/ZDI-16-171 -
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html -
References (CONFIRM) http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html -
References (BID) http://www.securityfocus.com/bid/83125 - () http://www.securityfocus.com/bid/83125 -

Information

Published : 2016-02-14 02:59

Updated : 2024-02-28 15:21


NVD link : CVE-2016-1626

Mitre link : CVE-2016-1626

CVE.ORG link : CVE-2016-1626


JSON object : View

Products Affected

debian

  • debian_linux

google

  • chrome

opensuse

  • opensuse
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer