CVE-2016-10504

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-10504
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10504.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-10504
Downstream
Related
Published
2017-08-30T09:29:00Z
Modified
2025-08-09T20:01:27Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Heap-based buffer overflow vulnerability in the opjmqcbyteout function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file.

References

Affected packages

Debian:11 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/debian/openjpeg2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/debian/openjpeg2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/debian/openjpeg2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/debian/openjpeg2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/uclouvain/openjpeg

Affected ranges

Type
GIT
Repo
https://github.com/uclouvain/openjpeg
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

{
    "vanir_signatures": [
        {
            "source": "https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2016-10504-64d69c19",
            "digest": {
                "function_hash": "173573818782671721813576327712645587033",
                "length": 477.0
            },
            "signature_type": "Function",
            "target": {
                "file": "src/lib/openjp2/tcd.c",
                "function": "opj_tcd_code_block_enc_allocate_data"
            }
        },
        {
            "source": "https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2016-10504-ab7fcd5f",
            "digest": {
                "line_hashes": [
                    "84287188712089355687759545531450893603",
                    "177311097550808870559618388162182863081",
                    "334731653267446734227190207039040309428",
                    "71253646569722539028308263770500150912",
                    "229560804484841681537562014431883906713"
                ],
                "threshold": 0.9
            },
            "signature_type": "Line",
            "target": {
                "file": "src/lib/openjp2/tcd.c"
            }
        }
    ]
}