First published: Sun Feb 04 2018(Updated: )
In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | =2.3.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =18.04 | |
Oracle Georaster | =18c | |
debian/openjpeg2 | <=2.1.2-1.1<=2.3.0-1 | 2.3.0-2 2.1.2-1.1+deb9u3 |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6616 is a vulnerability in OpenJPEG 2.3.0 that allows remote attackers to cause a denial of service via a crafted bmp file.
CVE-2018-6616 has a severity level of medium.
The following software versions are affected by CVE-2018-6616: OpenJPEG 2.3.0-2+deb10u2, 2.4.0-3, 2.5.0-2, 2.3.1, 2.3.0-2, and 2.1.2-1.1+.
To fix CVE-2018-6616, update to OpenJPEG version 2.3.1 or later.
You can find more information about CVE-2018-6616 at the following references: Github issue (https://github.com/uclouvain/openjpeg/issues/1059), Debian security tracker (https://security-tracker.debian.org/tracker/CVE-2018-6616), and MITRE CVE dictionary (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616).