Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2017.0051
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2017-0051)
Zusammenfassung:The remote host is missing an update for the 'openjpeg2' package(s) announced via the MGASA-2017-0051 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'openjpeg2' package(s) announced via the MGASA-2017-0051 advisory.

Vulnerability Insight:
Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl
function in openjp2/pi.c:523 in OpenJPEG 2.1.2. (CVE-2016-9112)

There is a NULL pointer dereference in function imagetobmp of
convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not assigned
a value after initialization(NULL). Impact is Denial of Service.
(CVE-2016-9113)

There is a NULL Pointer Access in function imagetopnm of
convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not
assigned a value after initialization(NULL). Impact is Denial of
Service. (CVE-2016-9114)

Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in
OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted
j2k file. (CVE-2016-9115)

NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in
OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted
j2k file. (CVE-2016-9116)

NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in
OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted
j2k file. (CVE-2016-9117)

Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of
convert.c:1719 in OpenJPEG 2.1.2. (CVE-2016-9118)

Affected Software/OS:
'openjpeg2' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-9112
BugTraq ID: 93978
http://www.securityfocus.com/bid/93978
https://security.gentoo.org/glsa/201710-26
https://github.com/uclouvain/openjpeg/issues/855
https://www.oracle.com/security-alerts/cpujul2020.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00010.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9113
BugTraq ID: 93980
http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
Common Vulnerability Exposure (CVE) ID: CVE-2016-9114
BugTraq ID: 93979
http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
Common Vulnerability Exposure (CVE) ID: CVE-2016-9115
BugTraq ID: 93977
http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
Common Vulnerability Exposure (CVE) ID: CVE-2016-9116
BugTraq ID: 93975
http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
Common Vulnerability Exposure (CVE) ID: CVE-2016-9117
BugTraq ID: 93783
http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
Common Vulnerability Exposure (CVE) ID: CVE-2016-9118
BugTraq ID: 93976
http://www.securityfocus.com/bid/93976
Debian Security Information: DSA-4013 (Google Search)
http://www.debian.org/security/2017/dsa-4013
https://github.com/uclouvain/openjpeg/issues/861
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.