In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
References
Link | Resource |
---|---|
https://github.com/uclouvain/openjpeg/issues/1044 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4109-1/ | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4405 | Third Party Advisory |
Configurations
History
03 Feb 2021, 16:07
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/11/msg00018.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4109-1/ - Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
26 Jan 2021, 12:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:* |
Information
Published : 2017-12-08 19:29
Updated : 2023-12-10 12:15
NVD link : CVE-2017-17480
Mitre link : CVE-2017-17480
CVE.ORG link : CVE-2017-17480
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- debian_linux
uclouvain
- openjpeg
CWE
CWE-787
Out-of-bounds Write