[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2012-111 --- openjpeg

ID: oval:org.secpod.oval:def:1601255Date: (C)2020-11-27   (M)2023-02-20
Class: PATCHFamily: unix




An input validation flaw, leading to a heap-based buffer overflow, was found in the way OpenJPEG handled the tile number and size in an image tile header. A remote attacker could provide a specially-crafted image file that, when decoded using an application linked against OpenJPEG, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. OpenJPEG allocated insufficient memory when encoding JPEG 2000 files from input images that have certain color depths. A remote attacker could provide a specially-crafted image file that, when opened in an application linked against OpenJPEG , would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application

Platform:
Amazon Linux AMI
Product:
openjpeg
Reference:
ALAS-2012-111
CVE-2009-5030
CVE-2012-3358
CVE    2
CVE-2009-5030
CVE-2012-3358
CPE    2
cpe:/o:amazon:linux
cpe:/a:openjpeg:openjpeg

© SecPod Technologies