First published: Sun Sep 11 2016(Updated: )
Heap-based buffer overflow in the opj_dwt_interleave_v function in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.1 | |
Google Chrome (Trace Event) | <=52.0.2743.116 | |
Fedora | =23 | |
Fedora | =24 | |
Fedora | =25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5157 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2016-5157, update Google Chrome to version 53.0.2785.89 or later for Windows and OS X and version 53.0.2785.92 or later for Linux.
CVE-2016-5157 affects OpenJPEG used within Google Chrome versions prior to 53.0.2785.89 on Windows and OS X and prior to 53.0.2785.92 on Linux.
CVE-2016-5157 can be exploited by remote attackers through crafted JPEG 2000 data that contains malicious coordinate values.
Yes, CVE-2016-5157 specifically impacts systems running on Windows, OS X, and Linux.