CVE-2020-27824

A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Information

Published : 2021-05-13 14:15

Updated : 2021-10-20 11:15


NVD link : CVE-2020-27824

Mitre link : CVE-2020-27824


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_linux

uclouvain

  • openjpeg

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation

CWE-125

Out-of-bounds Read

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')