SB2018112217 - Memory corruption in openjpeg (Alpine package)
Published: November 22, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2017-17480)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.
The vulnerability exists due to stack-based buffer overflow in the pgxtoimage function in jpwl/convert.c. A remote unauthenticated attacker can trigger memory corruption that leads to out-of-bounds write and cause the service to crash or execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=18df15dbb366dab8b2d3261d3758f99b8524906d
- https://git.alpinelinux.org/aports/commit/?id=f2c26c7c744245bc3ea738b6a304b4206ba171f4
- https://git.alpinelinux.org/aports/commit/?id=12fd347ffe7f9822f46f4cb6f4841ab6fa558edd
- https://git.alpinelinux.org/aports/commit/?id=50f991efc36983c48ef31001e2cb0433b2745479
- https://git.alpinelinux.org/aports/commit/?id=b02bbf085421c6efa07378f71077a1a317428866
- https://git.alpinelinux.org/aports/commit/?id=5b27b635acbe69cadaffce1fbe4b69d8256c1315
- https://git.alpinelinux.org/aports/commit/?id=63abfe33f12495cf5ac86d5fd590f018538d33b1
- https://git.alpinelinux.org/aports/commit/?id=6dd49eeff4953456d2d668b4e7653967a44a4972
- https://git.alpinelinux.org/aports/commit/?id=c1056d67e6379994bfff3cc8ff60b100bb94f0a0