First published: Tue Jan 23 2018(Updated: )
A flaw was found in OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. Reference: <a href="https://github.com/uclouvain/openjpeg/issues/1057">https://github.com/uclouvain/openjpeg/issues/1057</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJPEG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1537758 is high due to the potential for denial of service from a crafted bmp file.
To fix REDHAT-BUG-1537758, update OpenJPEG to the latest version where this vulnerability has been patched.
REDHAT-BUG-1537758 is caused by an integer overflow due to an out-of-bounds left shift in the opj_j2k_setup_encoder function.
Users and systems running OpenJPEG version 2.3.0 are affected by REDHAT-BUG-1537758.
Yes, REDHAT-BUG-1537758 can be exploited remotely by attackers using specially crafted bmp files.