MGASA-2016-0362

Source
https://advisories.mageia.org/MGASA-2016-0362.html
Import Source
https://advisories.mageia.org/MGASA-2016-0362.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0362
Related
Published
2016-11-03T09:02:50Z
Modified
2016-11-03T08:52:43Z
Summary
Updated openjpeg2 packages fix security vulnerabilities
Details

A specially crafted JPEG2000 image file can force Out-Of-Bounds Read in opjtcdfree_tile() (CVE-2016-3181).

A specially crafted JPEG2000 image file can force Heap Corruption in opj_free() (CVE-2016-3182).

A specially crafted JPEG2000 image file can force Out-Of-Bounds Read in sycc422torgb() (CVE-2016-3183).

OpenJPEG Heap Buffer Overflow in function colorcmykto_rgb() in color.c (CVE-2016-4796).

OpenJPEG division-by-zero in function opjtcdinit_tile() in tcd.c (CVE-2016-4797).

Heap-based buffer overflow in the opjdwtinterleave_v function in dwt.c in OpenJPEG allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data (CVE-2016-5157).

Integer overflow in the opjpicreate_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write (CVE-2016-7163).

convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s (CVE-2016-7445).

A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution (CVE-2016-8332).

References
Credits

Affected packages