First published: Thu Sep 17 2020(Updated: )
An exploitable code execution vulnerability exists in the JPEG2000 Stripe Decoding functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242 when decoding sub-samples. While initializing tiles with sub-sample data, the application can miscalculate a pointer for the stripes in the tile which allow for the decoder to write out of-bounds and cause memory corruption. This can result in code execution. A specially crafted image can be embedded inside a PDF and loaded by a victim in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gonitro Nitro Pro | =13.13.2.242 | |
Gonitro Nitro Pro | =13.16.2.300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6112 is an exploitable code execution vulnerability in the JPEG2000 Stripe Decoding functionality of Nitro Pro 13.13.2.242.
The vulnerability in Nitro Pro 13.13.2.242 occurs when decoding sub-samples in the JPEG2000 Stripe Decoding functionality, leading to a miscalculation of a pointer for the stripes in the tile.
CVE-2020-6112 has a severity score of 7.8 out of 10, making it a high severity vulnerability.
CVE-2020-6112 affects Nitro Pro versions 13.13.2.242 and 13.16.2.300.
To fix the vulnerability in Nitro Pro, it is recommended to update to the latest version provided by Nitro Software, Inc.