First published: Thu Mar 22 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way JP2, the JPEG-2000 file format reader / writer of the OpenJPEG, an open-source JPEG 2000 codec, performed processing of palette information, present in JP2 Header Box for certain JPEG 2000 format images. A remote attacker could provide a JPEG 2000 format image file with specially-crafted value of palette index, which once processed by the JPEG 2000 decoder would leak to JPEG 2000 decoder crash, or, potentially arbitrary code execution with the privileges of the user running the decoder. References: [1] <a href="http://technet.microsoft.com/en-us/security/msvr/msvr12-004">http://technet.microsoft.com/en-us/security/msvr/msvr12-004</a> [2] <a href="https://secunia.com/advisories/48498/">https://secunia.com/advisories/48498/</a> Possible upstream patch, but it references MSVR-11-117 id instead of MSVR12-004. We need to confirm both refer to the same issue: [3] <a href="http://code.google.com/p/openjpeg/source/detail?r=1330">http://code.google.com/p/openjpeg/source/detail?r=1330</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <=1.4 | |
Uclouvain Openjpeg | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.