First published: Wed Aug 01 2018(Updated: )
An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjpeg2 | 2.3.0-2+deb10u2 2.4.0-3 2.5.0-2 | |
Uclouvain Openjpeg | =2.1.2 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9573 is an out-of-bounds read vulnerability found in OpenJPEG 2.1.2
CVE-2016-9573 affects OpenJPEG 2.1.2 in the j2k_to_image tool, potentially causing the application to crash or disclose heap data when converting a specially crafted JPEG2000 file to another format.
CVE-2016-9573 has a severity rating of 8.1 (High).
To fix CVE-2016-9573, update to OpenJPEG version 2.3.0-2+deb10u2, 2.4.0-3, or 2.5.0-2.
You can find more information about CVE-2016-9573 at the following references: http://rhn.redhat.com/errata/RHSA-2017-0838.html, http://www.securityfocus.com/bid/97073, and https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573.