CVE-2019-12973

In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/108900 Third Party Advisory VDB Entry
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3 Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503 Broken Link
https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202101-29 Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/108900 Third Party Advisory VDB Entry
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3 Patch Third Party Advisory
https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503 Broken Link
https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202101-29 Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:uclouvain:openjpeg:2.3.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*

History

21 Nov 2024, 04:23

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/108900 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108900 - Third Party Advisory, VDB Entry
References () https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3 - Patch, Third Party Advisory () https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3 - Patch, Third Party Advisory
References () https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503 - Broken Link () https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503 - Broken Link
References () https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202101-29 - Third Party Advisory () https://security.gentoo.org/glsa/202101-29 - Third Party Advisory
References () https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory () https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory

Information

Published : 2019-06-26 18:15

Updated : 2024-11-21 04:23


NVD link : CVE-2019-12973

Mitre link : CVE-2019-12973

CVE.ORG link : CVE-2019-12973


JSON object : View

Products Affected

uclouvain

  • openjpeg

oracle

  • database_server
  • outside_in_technology

debian

  • debian_linux

opensuse

  • leap
CWE
CWE-834

Excessive Iteration