First published: Thu May 12 2016(Updated: )
A heap buffer overflow in function color_cmyk_to_rgb in color.c. Upstream patch: <a href="https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91">https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/327">http://seclists.org/oss-sec/2016/q2/327</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg | <=2.1.0 | |
Fedoraproject Fedora | =23 | |
Fedoraproject Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4796 is classified as a high severity vulnerability due to the potential for heap buffer overflow leading to exploitation.
To mitigate CVE-2016-4796, users should update to the patched version of OpenJPEG that addresses the heap buffer overflow.
CVE-2016-4796 affects OpenJPEG versions up to and including 2.1.0.
Yes, CVE-2016-4796 can potentially be exploited remotely by attackers through crafted CMYK images.
The impact of CVE-2016-4796 may include crashes, arbitrary code execution, or denial of service on affected systems.