First published: Sun Sep 11 2016(Updated: )
Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjpeg2 | 2.3.0-2+deb10u2 2.4.0-3 2.5.0-2 | |
SUSE Linux | =42.1 | |
Google Chrome (Trace Event) | <=52.0.2743.116 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5159 has a severity rating that indicates it can lead to denial of service through heap-based buffer overflow.
To fix CVE-2016-5159, update OpenJPEG to the latest patched versions specified, such as 2.3.0-2+deb10u2, 2.4.0-3, or 2.5.0-2.
CVE-2016-5159 affects multiple versions of OpenJPEG and Google Chrome prior to version 53.0.2785.89 for Windows and OS X, and 53.0.2785.92 for Linux.
Yes, CVE-2016-5159 can be exploited remotely by attackers using crafted JPEG 2000 data.
The impact of CVE-2016-5159 can result in a denial of service condition through heap-based buffer overflow or potentially other unspecified consequences.