First published: Fri Mar 02 2018(Updated: )
An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-7648.
The severity of CVE-2018-7648 is critical with a CVSS score of 9.8.
The affected software is Uclouvain Openjpeg version 2.3.0.
CVE-2018-7648 can cause a buffer overflow in OpenJPEG 2.3.0 when providing a prefix with 50 or more characters on the command line.
Yes, you can find more information about CVE-2018-7648 at the following references: [Link 1](https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d) and [Link 2](https://github.com/uclouvain/openjpeg/issues/1088).