First published: Fri Jan 19 2018(Updated: )
A flaw was found in OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. Reference: <a href="https://github.com/uclouvain/openjpeg/issues/1057">https://github.com/uclouvain/openjpeg/issues/1057</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjpeg2 | <=2.1.2-1.1<=2.3.0-1 | 2.3.0-2 2.1.2-1.1+deb9u3 |
Uclouvain Openjpeg | =2.3.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =18.04 | |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-5785 is medium with a severity value of 6.5.
The affected software of CVE-2018-5785 includes OpenJPEG 2.3.0 and OpenJPEG 2.3.0-2.
Remote attackers can exploit CVE-2018-5785 by leveraging the integer overflow vulnerability in the opj_j2k_setup_encoder function to cause a denial of service using a crafted bmp file.
Yes, a fix is available for CVE-2018-5785. It is recommended to update to OpenJPEG version 2.3.1 or higher.
The Common Weakness Enumeration (CWE) of CVE-2018-5785 is CWE-190, which is the integer overflow vulnerability.