First published: Wed Jul 18 2012(Updated: )
Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg | =1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3358 has a high severity rating due to its potential for denial of service and arbitrary code execution.
To fix CVE-2012-3358, upgrade to OpenJPEG version 1.5.1 or later, as the vulnerability has been addressed in subsequent releases.
CVE-2012-3358 describes a remote code execution vulnerability that can be exploited via crafted JPEG 2000 image files.
OpenJPEG version 1.5 is affected by CVE-2012-3358.
An attacker can cause a denial of service by crashing the application or potentially execute arbitrary code on the victim's system.