First published: Sun Sep 11 2016(Updated: )
Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <=52.0.2743.116 | |
openSUSE | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5152 has been classified as a high severity vulnerability that can lead to denial of service.
To fix CVE-2016-5152, update Google Chrome to version 53.0.2785.89 or later on Windows and OS X, and version 53.0.2785.92 or later on Linux.
CVE-2016-5152 is caused by an integer overflow in the opj_tcd_get_decoded_tile_size function of OpenJPEG.
CVE-2016-5152 affects Google Chrome versions prior to 53.0.2785.89 on Windows and OS X, and prior to 53.0.2785.92 on Linux.
The potential impacts of CVE-2016-5152 include a heap-based buffer overflow which can result in remote code execution or denial of service.