First published: Sun Aug 18 2019(Updated: )
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djvulibre Project Djvulibre | =3.5.27 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
debian/djvulibre | 3.5.28-2 | |
ubuntu/djvulibre | <3.5.27.1-8ubuntu0.1 | 3.5.27.1-8ubuntu0.1 |
ubuntu/djvulibre | <3.5.27.1-10ubuntu0.1 | 3.5.27.1-10ubuntu0.1 |
ubuntu/djvulibre | <3.5.27.1-11 | 3.5.27.1-11 |
ubuntu/djvulibre | <3.5.27.1-5ubuntu0.1 | 3.5.27.1-5ubuntu0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15145 is a vulnerability in DjVuLibre 3.5.27 that allows attackers to cause a denial-of-service attack by crafting a corrupted JB2 image file.
CVE-2019-15145 has a severity rating of 5.5 (medium).
To fix CVE-2019-15145, update DjVuLibre to version 3.5.27.1-8ubuntu0.1 (for Ubuntu) or apply the corresponding update for your operating system.
You can find more information about CVE-2019-15145 in the provided references: [link1], [link2], [link3].
The CWE ID for CVE-2019-15145 is CWE-125.