First published: Mon Jun 29 2020(Updated: )
jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <=2.3.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Oracle Outside In Technology | =8.5.4 | |
Oracle Outside In Technology | =8.5.5 | |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-15389.
The severity level of CVE-2020-15389 is medium with a score of 6.5.
The affected software is OpenJPEG through version 2.3.1.
CVE-2020-15389 can lead to a use-after-free vulnerability and potential double-free, allowing an attacker to execute arbitrary code or cause a denial of service.
Yes, fixes are available for CVE-2020-15389. Please refer to the vendor's website or update your software to the latest version.