Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2017.0122
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2017-0122)
Zusammenfassung:The remote host is missing an update for the 'openjpeg' package(s) announced via the MGASA-2017-0122 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'openjpeg' package(s) announced via the MGASA-2017-0122 advisory.

Vulnerability Insight:
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in
OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow
remote attackers to cause a denial of service (heap-based buffer overflow)
or possibly have unspecified other impact via crafted JPEG 2000 data.
(CVE-2016-5139)

Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in
OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on
Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers
to cause a denial of service (heap-based buffer overflow) or possibly have
unspecified other impact via crafted JPEG 2000 data. (CVE-2016-5158)

Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome
before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux,
allow remote attackers to cause a denial of service (heap-based buffer
overflow) or possibly have unspecified other impact via crafted JPEG 2000
data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
(CVE-2016-5159)

Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG
allows remote attackers to execute arbitrary code via a crafted JP2 file,
which triggers an out-of-bounds read or write. (CVE-2016-7163)

An out-of-bounds read vulnerability was found in OpenJPEG, in the
j2k_to_image tool. Converting a specially crafted JPEG2000 file to another
format could cause the application to crash or, potentially, disclose some
data from the heap. (CVE-2016-9573

Affected Software/OS:
'openjpeg' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-5139
BugTraq ID: 92276
http://www.securityfocus.com/bid/92276
Debian Security Information: DSA-3645 (Google Search)
http://www.debian.org/security/2016/dsa-3645
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KMX62M7UNRLWO4FEQ6YIMPMTKXXJV6A/
https://security.gentoo.org/glsa/201610-09
https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html
RedHat Security Advisories: RHSA-2016:1580
http://rhn.redhat.com/errata/RHSA-2016-1580.html
RedHat Security Advisories: RHSA-2017:0559
http://rhn.redhat.com/errata/RHSA-2017-0559.html
RedHat Security Advisories: RHSA-2017:0838
http://rhn.redhat.com/errata/RHSA-2017-0838.html
http://www.securitytracker.com/id/1036547
SuSE Security Announcement: openSUSE-SU-2016:1982 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html
SuSE Security Announcement: openSUSE-SU-2016:1983 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5158
BugTraq ID: 92717
http://www.securityfocus.com/bid/92717
Debian Security Information: DSA-3660 (Google Search)
http://www.debian.org/security/2016/dsa-3660
RedHat Security Advisories: RHSA-2016:1854
http://rhn.redhat.com/errata/RHSA-2016-1854.html
http://www.securitytracker.com/id/1036729
SuSE Security Announcement: SUSE-SU-2016:2251 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html
SuSE Security Announcement: openSUSE-SU-2016:2250 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html
SuSE Security Announcement: openSUSE-SU-2016:2296 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html
SuSE Security Announcement: openSUSE-SU-2016:2349 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5159
Debian Security Information: DSA-3768 (Google Search)
http://www.debian.org/security/2017/dsa-3768
Common Vulnerability Exposure (CVE) ID: CVE-2016-7163
BugTraq ID: 92897
http://www.securityfocus.com/bid/92897
Debian Security Information: DSA-3665 (Google Search)
http://www.debian.org/security/2016/dsa-3665
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQ2IIIQSJ3J4MONBOGCG6XHLKKJX2HKM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGKSEWWWED77Q5ZHK4OA2EKSJXLRU3MK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4IRSGYMBSHCBZP23CUDIRJ3LBKH6ZJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2T6IQAMS4W65MGP7UW5FPE22PXELTK5D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYLOX7PZS3ZUHQ6RGI3M6H27B7I5ZZ26/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66BWMMMWXH32J5AOGLAJGZA3GH5LZHXH/
http://www.openwall.com/lists/oss-security/2016/09/08/3
http://www.openwall.com/lists/oss-security/2016/09/08/6
Common Vulnerability Exposure (CVE) ID: CVE-2016-9573
97073
http://www.securityfocus.com/bid/97073
DSA-3768
https://www.debian.org/security/2017/dsa-3768
GLSA-201710-26
https://security.gentoo.org/glsa/201710-26
RHSA-2017:0838
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573
https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
https://github.com/uclouvain/openjpeg/issues/862
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.