First published: Fri Jan 19 2018(Updated: )
A flaw was found in OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function in openjp2/t1.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. References: <a href="https://github.com/uclouvain/openjpeg/issues/1053">https://github.com/uclouvain/openjpeg/issues/1053</a>
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1536552 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1536552, you should update OpenJPEG to the latest version that addresses the integer overflow issue.
The impact of REDHAT-BUG-1536552 allows remote attackers to exploit crafted bmp files to cause a denial of service.
Yes, REDHAT-BUG-1536552 is exploitable remotely by attackers using specially crafted bmp files.
The vulnerability REDHAT-BUG-1536552 affects OpenJPEG version 2.3.0.