(CVE-2012-3358) CVE-2012-3358 openjpeg: heap-based buffer overflow when processing JPEG2000 image files
Bug #1023259 reported by
Karma Dorje
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openjpeg (Debian) |
Fix Released
|
Unknown
|
|||
openjpeg (Fedora) |
Fix Released
|
High
|
|||
openjpeg (Ubuntu) |
Fix Released
|
Medium
|
Unassigned |
Bug Description
A heap-based buffer overflow was found in the way OpenJPEG, an
open-source JPEG 2000 codec written in C language, performed parsing of
JPEG2000 having certain number of tiles and tilesizes. A remote
attacker could provide a specially crafted JPEG 2000 file, which when
opened in an application linked against openjpeg would lead to that
application crash, or, potentially arbitrary code execution with the
privileges of the user running the application.
Upstream patch:
http://
References:
https:/
http://
This issue has been assigned CVE-2012-3358
CVE References
visibility: | private → public |
Changed in openjpeg (Debian): | |
status: | Unknown → Fix Released |
Changed in openjpeg (Fedora): | |
importance: | Unknown → High |
status: | Unknown → Fix Released |
Changed in openjpeg (Ubuntu): | |
importance: | Undecided → Medium |
To post a comment you must log in.
A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 having certain number of tiles and tilesizes. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application.