First published: Mon Dec 14 2020(Updated: )
A flaw was found in OpenJPEG. Specially crafted input file can lead to a heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c. Reference: <a href="https://github.com/uclouvain/openjpeg/issues/1302">https://github.com/uclouvain/openjpeg/issues/1302</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <2.4.0 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Oracle Outside In Technology | =8.5.5 | |
redhat/openjpeg | <2.4.0 | 2.4.0 |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw is CVE-2020-27845.
The severity of CVE-2020-27845 is medium (5.5).
The highest impact of this flaw is to application availability.
Versions prior to 2.4.0 of openjpeg are affected by CVE-2020-27845.
An attacker can exploit CVE-2020-27845 by providing untrusted input to openjpeg's conversion/encoding functionality, leading to an out-of-bounds read.