First published: Tue Jul 24 2012(Updated: )
A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 image files. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Acknowledgements: This issue was discovered by Huzaifa Sidhpurwala of the Red Hat Security Response Team.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg | <=1.5 | |
uclouvain openjpeg | =1.3 | |
uclouvain openjpeg | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3535 is considered a critical vulnerability as it can lead to remote code execution due to a heap-based buffer overflow.
To fix CVE-2012-3535, update OpenJPEG to version 1.5 or later, which addresses the buffer overflow issue.
CVE-2012-3535 affects OpenJPEG versions 1.3, 1.4, and all versions up to and including 1.5.
A remote attacker can exploit CVE-2012-3535 by providing a specially crafted JPEG 2000 file that triggers the buffer overflow when the file is opened.
CVE-2012-3535 can allow attackers to gain control over applications linked against OpenJPEG, potentially executing arbitrary code.