First published: Tue Sep 05 2017(Updated: )
A mishandled zero case was discovered in opj_j2k_set_cinema_parameters in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or possibly remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJPEG | =2.2.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14152 is rated as a high severity vulnerability due to the potential for a remote denial of service caused by heap-based buffer overflow.
To fix CVE-2017-14152, update OpenJPEG to version 2.3.0 or later.
CVE-2017-14152 affects OpenJPEG version 2.2.0 and specifically impacts Debian Linux versions 8.0 and 9.0.
CVE-2017-14152 exploits a mishandled zero case that leads to an out-of-bounds write in the OpenJPEG library.
The primary symptom of CVE-2017-14152 is unexpected application crashes or remote denial of service when processing certain JPEG 2000 files.