First published: Thu Mar 22 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way JP2, the JPEG-2000 file format reader / writer of the OpenJPEG, an open-source JPEG 2000 codec, performed processing of palette information, present in JP2 Header Box for certain JPEG 2000 format images. A remote attacker could provide a JPEG 2000 format image file with specially-crafted value of palette index, which once processed by the JPEG 2000 decoder would leak to JPEG 2000 decoder crash, or, potentially arbitrary code execution with the privileges of the user running the decoder. References: [1] <a href="http://technet.microsoft.com/en-us/security/msvr/msvr12-004">http://technet.microsoft.com/en-us/security/msvr/msvr12-004</a> [2] <a href="https://secunia.com/advisories/48498/">https://secunia.com/advisories/48498/</a> Possible upstream patch, but it references MSVR-11-117 id instead of MSVR12-004. We need to confirm both refer to the same issue: [3] <a href="http://code.google.com/p/openjpeg/source/detail?r=1330">http://code.google.com/p/openjpeg/source/detail?r=1330</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg | <=1.4 | |
uclouvain openjpeg | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1499 is classified as a high severity vulnerability due to its potential to allow remote code execution from specially crafted JPEG 2000 files.
To fix CVE-2012-1499, upgrade OpenJPEG to version 1.5 or later where the vulnerability is addressed.
CVE-2012-1499 affects OpenJPEG versions up to and including 1.4 and specifically 1.3.
Yes, CVE-2012-1499 can be exploited remotely through malicious JPEG 2000 files.
CVE-2012-1499 enables a buffer overflow attack, potentially leading to remote code execution.