In OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
References
Link | Resource |
---|---|
https://github.com/uclouvain/openjpeg/issues/1057 | Exploit Issue Tracking Third Party Advisory |
https://usn.ubuntu.com/4109-1/ | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4405 | Third Party Advisory |
https://github.com/uclouvain/openjpeg/issues/1057 | Exploit Issue Tracking Third Party Advisory |
https://usn.ubuntu.com/4109-1/ | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4405 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/uclouvain/openjpeg/issues/1057 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://usn.ubuntu.com/4109-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4405 - Third Party Advisory |
Information
Published : 2018-01-19 08:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5785
Mitre link : CVE-2018-5785
CVE.ORG link : CVE-2018-5785
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
uclouvain
- openjpeg
CWE
CWE-190
Integer Overflow or Wraparound