First published: Mon Jul 03 2023(Updated: )
A vulnerability was found in OpenJPEG where an attacker remotely sends malicious pictures to allow the program to run, which can cause denial of service and exhaust system resources. References: <a href="https://github.com/uclouvain/openjpeg/issues/1471">https://github.com/uclouvain/openjpeg/issues/1471</a> <a href="https://github.com/uclouvain/openjpeg/pull/1470">https://github.com/uclouvain/openjpeg/pull/1470</a>
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2219236 is considered high due to the potential for denial of service and resource exhaustion.
To fix REDHAT-BUG-2219236, ensure you update to the latest version of OpenJPEG that addresses this vulnerability.
Addressing REDHAT-BUG-2219236 mitigates remote code execution and denial of service attacks stemming from malicious image files.
Users and systems running vulnerable versions of UCLouvain OpenJPEG are at risk from REDHAT-BUG-2219236.
Yes, REDHAT-BUG-2219236 can be exploited remotely by sending malicious images to the OpenJPEG program.