First published: Thu May 06 2021(Updated: )
A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <=2.4.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/openjpeg2 | <=2.4.0-3<=2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3575 is a heap-based buffer overflow vulnerability found in openjpeg.
An attacker can exploit CVE-2021-3575 by using a crafted .j2k file to trigger the buffer overflow and execute arbitrary code.
Uclouvain Openjpeg 2.4.0, Redhat Enterprise Linux 6.0, Redhat Enterprise Linux 7.0, Redhat Enterprise Linux 8.0, Fedoraproject Fedora 33, and Fedoraproject Fedora 34 are affected by CVE-2021-3575.
The severity of CVE-2021-3575 is high, with a CVSS score of 7.8.
To mitigate CVE-2021-3575, it is recommended to update to the latest version of the affected software or apply any patches or fixes provided by the vendor.