CVE-2016-1645

Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html - () http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html - () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html - () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html - () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html -
References () http://www.debian.org/security/2016/dsa-3513 - () http://www.debian.org/security/2016/dsa-3513 -
References () http://www.securityfocus.com/bid/84224 - () http://www.securityfocus.com/bid/84224 -
References () http://www.securitytracker.com/id/1035259 - () http://www.securitytracker.com/id/1035259 -
References () http://www.zerodayinitiative.com/advisories/ZDI-16-197/ - () http://www.zerodayinitiative.com/advisories/ZDI-16-197/ -
References () https://code.google.com/p/chromium/issues/detail?id=587227 - () https://code.google.com/p/chromium/issues/detail?id=587227 -
References () https://pdfium.googlesource.com/pdfium/+/c145aeb2bf13ac408fc3e8233acca43d4251bbdc - () https://pdfium.googlesource.com/pdfium/+/c145aeb2bf13ac408fc3e8233acca43d4251bbdc -

07 Nov 2023, 02:30

Type Values Removed Values Added
References (DEBIAN) http://www.debian.org/security/2016/dsa-3513 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3513 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00066.html -
References (CONFIRM) http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=587227 - Vendor Advisory () https://code.google.com/p/chromium/issues/detail?id=587227 -
References (SECTRACK) http://www.securitytracker.com/id/1035259 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035259 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00067.html -
References (CONFIRM) https://pdfium.googlesource.com/pdfium/+/c145aeb2bf13ac408fc3e8233acca43d4251bbdc - Vendor Advisory () https://pdfium.googlesource.com/pdfium/+/c145aeb2bf13ac408fc3e8233acca43d4251bbdc -
References (BID) http://www.securityfocus.com/bid/84224 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/84224 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00073.html -
References (CONFIRM) http://www.zerodayinitiative.com/advisories/ZDI-16-197/ - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-16-197/ -

Information

Published : 2016-03-13 22:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1645

Mitre link : CVE-2016-1645

CVE.ORG link : CVE-2016-1645


JSON object : View

Products Affected

opensuse

  • leap
  • suse_linux_enterprise_server
  • opensuse

debian

  • debian_linux

google

  • chrome
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer