In OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
References
Link | Resource |
---|---|
https://github.com/uclouvain/openjpeg/issues/1057 | Exploit Issue Tracking Third Party Advisory |
https://usn.ubuntu.com/4109-1/ | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4405 | Third Party Advisory |
Configurations
History
03 Feb 2021, 16:13
Type | Values Removed | Values Added |
---|---|---|
References | (UBUNTU) https://usn.ubuntu.com/4109-1/ - Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
26 Jan 2021, 12:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:* |
Information
Published : 2018-01-19 08:29
Updated : 2023-12-10 12:30
NVD link : CVE-2018-5785
Mitre link : CVE-2018-5785
CVE.ORG link : CVE-2018-5785
JSON object : View
Products Affected
uclouvain
- openjpeg
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound