Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-44652.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-44652
Upstream
Published
2017-07-26T08:29:00Z
Modified
2026-04-01T05:16:42.745695Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
CVE-2017-11613 affecting package openjpeg2 2.3.1-12
Details

In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, tdimagelength is not checked. The value of tdimagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the TIFFCheckMalloc function is called based on tdimagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.

References

Affected packages

Azure Linux:3 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:rpm/azure-linux/openjpeg2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.3.1-12

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-44652.json"