Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.891579 |
Category: | Debian Local Security Checks |
Title: | Debian LTS: Security Advisory for openjpeg2 (DLA-1579-1) |
Summary: | Multiple vulnerabilities have been discovered in openjpeg2, the;open-source JPEG 2000 codec.;;CVE-2017-17480;;Write stack buffer overflow due to missing buffer length formatter in;fscanf call (jp3d and jpwl codecs). This vulnerability might be;leveraged by remote attackers using crafted jp3d and jpwl files to;cause denial of service or possibly remote code execution.;;CVE-2018-18088;;Null pointer dereference caused by null image components in imagetopnm.;This vulnerability might be leveraged by remote attackers using crafted;BMP files to cause denial of service. |
Description: | Summary: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec. CVE-2017-17480 Write stack buffer overflow due to missing buffer length formatter in fscanf call (jp3d and jpwl codecs). This vulnerability might be leveraged by remote attackers using crafted jp3d and jpwl files to cause denial of service or possibly remote code execution. CVE-2018-18088 Null pointer dereference caused by null image components in imagetopnm. This vulnerability might be leveraged by remote attackers using crafted BMP files to cause denial of service. Affected Software/OS: openjpeg2 on Debian Linux Solution: For Debian 8 'Jessie', these problems have been fixed in version 2.1.0-2+deb8u5. We recommend that you upgrade your openjpeg2 packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-17480 Common Vulnerability Exposure (CVE) ID: CVE-2018-18088 |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |