First published: Mon Dec 14 2020(Updated: )
A flaw was found in OpenJPEG. Specially crafted input file can lead to a heap-based buffer overflow in opj_t2_encode_packet function in openjp2/t2.c. Reference: <a href="https://github.com/uclouvain/openjpeg/issues/1299">https://github.com/uclouvain/openjpeg/issues/1299</a>
Credit: secalert@redhat.com Sean Campbell at Tableau
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <2.4.0 | |
Debian Debian Linux | =9.0 | |
Oracle Outside In Technology | =8.5.5 | |
redhat/openjpeg | <2.4.0 | 2.4.0 |
Google Chrome | <89.0.4389.72 | 89.0.4389.72 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27844 is a vulnerability found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0.
CVE-2020-27844 can impact confidentiality as it allows an attacker to cause an out-of-bounds write, potentially leading to unauthorized access to sensitive information.
Yes, CVE-2020-27844 has a severity rating of 7.8, which is considered high.
To fix CVE-2020-27844, update to version 2.4.0 or later of openjpeg.
More information about CVE-2020-27844 can be found in the references: [GitHub Issue](https://github.com/uclouvain/openjpeg/issues/1299), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1907698), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1907697).