First published: Tue Dec 08 2020(Updated: )
A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <2.4.0 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
redhat/openjpeg | <2.4.0 | 2.4.0 |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27824 is a vulnerability found in OpenJPEG's encoder that allows an attacker to cause a buffer overflow by supplying crafted input to decomposition levels.
The highest threat from CVE-2020-27824 is to system availability.
CVE-2020-27824 has a severity level of medium with a CVSS score of 5.5.
OpenJPEG versions 2.3.1-1ubuntu5, 2.3.0-2+, and 2.4.0 are affected by CVE-2020-27824.
Yes, you can find references for CVE-2020-27824 at the following links: [link1], [link2].