SB2012071903 - Multiple vulnerabilities in OpenJPEG
Published: July 19, 2012 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2012-3358)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
2) Buffer overflow (CVE-ID: CVE-2009-5030)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The tcd_free_encode function in tcd.c in OpenJPEG 1.3 through 1.5 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted tile information in a Gray16 TIFF image, which causes insufficient memory to be allocated and leads to an "invalid free."
Remediation
Install update from vendor's website.
References
- http://code.google.com/p/openjpeg/source/detail?r=1727
- http://osvdb.org/83741
- http://rhn.redhat.com/errata/RHSA-2012-1068.html
- http://secunia.com/advisories/49913
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:104
- http://www.openwall.com/lists/oss-security/2012/07/11/1
- http://www.securityfocus.com/bid/54373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76850
- http://code.google.com/p/openjpeg/issues/detail?id=5
- http://code.google.com/p/openjpeg/source/detail?r=1703
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082923.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/083105.html
- http://secunia.com/advisories/48781
- http://www.openwall.com/lists/oss-security/2012/04/13/5
- http://www.securityfocus.com/bid/53012
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74851
- https://groups.google.com/forum/#!topic/openjpeg/DLVrRKbTeI0/discussion