Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2017.0122
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2017-0122)
Summary:The remote host is missing an update for the 'openjpeg' package(s) announced via the MGASA-2017-0122 advisory.
Description:Summary:
The remote host is missing an update for the 'openjpeg' package(s) announced via the MGASA-2017-0122 advisory.

Vulnerability Insight:
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in
OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow
remote attackers to cause a denial of service (heap-based buffer overflow)
or possibly have unspecified other impact via crafted JPEG 2000 data.
(CVE-2016-5139)

Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in
OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on
Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers
to cause a denial of service (heap-based buffer overflow) or possibly have
unspecified other impact via crafted JPEG 2000 data. (CVE-2016-5158)

Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome
before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux,
allow remote attackers to cause a denial of service (heap-based buffer
overflow) or possibly have unspecified other impact via crafted JPEG 2000
data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
(CVE-2016-5159)

Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG
allows remote attackers to execute arbitrary code via a crafted JP2 file,
which triggers an out-of-bounds read or write. (CVE-2016-7163)

An out-of-bounds read vulnerability was found in OpenJPEG, in the
j2k_to_image tool. Converting a specially crafted JPEG2000 file to another
format could cause the application to crash or, potentially, disclose some
data from the heap. (CVE-2016-9573

Affected Software/OS:
'openjpeg' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-5139
BugTraq ID: 92276
http://www.securityfocus.com/bid/92276
Debian Security Information: DSA-3645 (Google Search)
http://www.debian.org/security/2016/dsa-3645
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KMX62M7UNRLWO4FEQ6YIMPMTKXXJV6A/
https://security.gentoo.org/glsa/201610-09
https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html
RedHat Security Advisories: RHSA-2016:1580
http://rhn.redhat.com/errata/RHSA-2016-1580.html
RedHat Security Advisories: RHSA-2017:0559
http://rhn.redhat.com/errata/RHSA-2017-0559.html
RedHat Security Advisories: RHSA-2017:0838
http://rhn.redhat.com/errata/RHSA-2017-0838.html
http://www.securitytracker.com/id/1036547
SuSE Security Announcement: openSUSE-SU-2016:1982 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00005.html
SuSE Security Announcement: openSUSE-SU-2016:1983 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5158
BugTraq ID: 92717
http://www.securityfocus.com/bid/92717
Debian Security Information: DSA-3660 (Google Search)
http://www.debian.org/security/2016/dsa-3660
RedHat Security Advisories: RHSA-2016:1854
http://rhn.redhat.com/errata/RHSA-2016-1854.html
http://www.securitytracker.com/id/1036729
SuSE Security Announcement: SUSE-SU-2016:2251 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html
SuSE Security Announcement: openSUSE-SU-2016:2250 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html
SuSE Security Announcement: openSUSE-SU-2016:2296 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html
SuSE Security Announcement: openSUSE-SU-2016:2349 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5159
Debian Security Information: DSA-3768 (Google Search)
http://www.debian.org/security/2017/dsa-3768
Common Vulnerability Exposure (CVE) ID: CVE-2016-7163
BugTraq ID: 92897
http://www.securityfocus.com/bid/92897
Debian Security Information: DSA-3665 (Google Search)
http://www.debian.org/security/2016/dsa-3665
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQ2IIIQSJ3J4MONBOGCG6XHLKKJX2HKM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGKSEWWWED77Q5ZHK4OA2EKSJXLRU3MK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4IRSGYMBSHCBZP23CUDIRJ3LBKH6ZJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2T6IQAMS4W65MGP7UW5FPE22PXELTK5D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYLOX7PZS3ZUHQ6RGI3M6H27B7I5ZZ26/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66BWMMMWXH32J5AOGLAJGZA3GH5LZHXH/
http://www.openwall.com/lists/oss-security/2016/09/08/3
http://www.openwall.com/lists/oss-security/2016/09/08/6
Common Vulnerability Exposure (CVE) ID: CVE-2016-9573
97073
http://www.securityfocus.com/bid/97073
DSA-3768
https://www.debian.org/security/2017/dsa-3768
GLSA-201710-26
https://security.gentoo.org/glsa/201710-26
RHSA-2017:0838
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573
https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
https://github.com/uclouvain/openjpeg/issues/862
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.