First published: Tue Jul 23 2019(Updated: )
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to <a href="https://access.redhat.com/security/cve/CVE-2018-6616">CVE-2018-6616</a>. Reference: <a href="https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3">https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3</a> <a href="https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503">https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503</a>
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1732270 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1732270, upgrade to the latest version of OpenJPEG that addresses this vulnerability.
REDHAT-BUG-1732270 is caused by excessive iteration in the opj_t1_encode_cblks function when processing specially crafted BMP files.
Yes, REDHAT-BUG-1732270 can be exploited remotely by attackers to cause a denial of service.
Redhat-BUG-1732270 affects versions of the UCLouvain OpenJPEG software prior to the patch that resolves this vulnerability.