SB2017083128 - Out-of-bounds write in OpenJPEG
Published: August 31, 2017 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds write (CVE-ID: CVE-2017-14041)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
Remediation
Install update from vendor's website.
References
- http://www.debian.org/security/2017/dsa-4013
- http://www.securityfocus.com/bid/100555
- https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/
- https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9
- https://github.com/uclouvain/openjpeg/issues/997