Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891579
Category:Debian Local Security Checks
Title:Debian LTS: Security Advisory for openjpeg2 (DLA-1579-1)
Summary:Multiple vulnerabilities have been discovered in openjpeg2, the;open-source JPEG 2000 codec.;;CVE-2017-17480;;Write stack buffer overflow due to missing buffer length formatter in;fscanf call (jp3d and jpwl codecs). This vulnerability might be;leveraged by remote attackers using crafted jp3d and jpwl files to;cause denial of service or possibly remote code execution.;;CVE-2018-18088;;Null pointer dereference caused by null image components in imagetopnm.;This vulnerability might be leveraged by remote attackers using crafted;BMP files to cause denial of service.
Description:Summary:
Multiple vulnerabilities have been discovered in openjpeg2, the
open-source JPEG 2000 codec.

CVE-2017-17480

Write stack buffer overflow due to missing buffer length formatter in
fscanf call (jp3d and jpwl codecs). This vulnerability might be
leveraged by remote attackers using crafted jp3d and jpwl files to
cause denial of service or possibly remote code execution.

CVE-2018-18088

Null pointer dereference caused by null image components in imagetopnm.
This vulnerability might be leveraged by remote attackers using crafted
BMP files to cause denial of service.

Affected Software/OS:
openjpeg2 on Debian Linux

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
2.1.0-2+deb8u5.

We recommend that you upgrade your openjpeg2 packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-17480
Common Vulnerability Exposure (CVE) ID: CVE-2018-18088
CopyrightCopyright (C) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.