First published: Wed Jun 26 2019(Updated: )
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to <a href="https://access.redhat.com/security/cve/CVE-2018-6616">CVE-2018-6616</a>. Reference: <a href="https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3">https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3</a> <a href="https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503">https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJPEG | =2.3.1 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
Debian GNU/Linux | =9.0 | |
Oracle Database | =18c | |
Oracle Outside In Technology | =8.5.4 | |
Oracle Outside In Technology | =8.5.5 | |
debian/openjpeg2 | 2.4.0-3 2.5.0-2+deb12u1 2.5.0-2 2.5.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.