Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93977 | Third Party Advisory VDB Entry |
https://github.com/uclouvain/openjpeg/issues/858 | Exploit Vendor Advisory |
https://security.gentoo.org/glsa/201710-26 | |
http://www.securityfocus.com/bid/93977 | Third Party Advisory VDB Entry |
https://github.com/uclouvain/openjpeg/issues/858 | Exploit Vendor Advisory |
https://security.gentoo.org/glsa/201710-26 |
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93977 - Third Party Advisory, VDB Entry | |
References | () https://github.com/uclouvain/openjpeg/issues/858 - Exploit, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201710-26 - |
Information
Published : 2016-10-30 22:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9115
Mitre link : CVE-2016-9115
CVE.ORG link : CVE-2016-9115
JSON object : View
Products Affected
uclouvain
- openjpeg
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer