First published: Thu Mar 22 2012(Updated: )
An out-of heap-based buffer write flaw was found in the way JP2, the JPEG-2000 file format reader / writer of the OpenJPEG, an open-source JPEG 2000 codec, performed processing of palette information, present in JP2 Header Box for certain JPEG 2000 format images. A remote attacker could provide a JPEG 2000 format image file with specially-crafted value of palette index, which once processed by the JPEG 2000 decoder would leak to JPEG 2000 decoder crash, or, potentially arbitrary code execution with the privileges of the user running the decoder. References: [1] <a href="http://technet.microsoft.com/en-us/security/msvr/msvr12-004">http://technet.microsoft.com/en-us/security/msvr/msvr12-004</a> [2] <a href="https://secunia.com/advisories/48498/">https://secunia.com/advisories/48498/</a> Possible upstream patch, but it references MSVR-11-117 id instead of MSVR12-004. We need to confirm both refer to the same issue: [3] <a href="http://code.google.com/p/openjpeg/source/detail?r=1330">http://code.google.com/p/openjpeg/source/detail?r=1330</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJPEG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-805912 is considered high due to the potential for a remote attacker to exploit the vulnerability.
To fix REDHAT-BUG-805912, you should apply the latest patch or update provided for OpenJPEG.
REDAHT-BUG-805912 affects the OpenJPEG library, specifically its processing of JPEG 2000 file format images.
Yes, REDHAT-BUG-805912 can be exploited remotely through specially crafted JPEG 2000 images.
REDAHT-BUG-805912 is a heap-based buffer write flaw.