Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-3358

Опубликовано: 18 июл. 2012
Источник: debian

Описание

Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjpegfixed1.3+dfsg-4.4package

Примечания

  • https://www.openwall.com/lists/oss-security/2012/07/11/1

  • Upstream patch: http://code.google.com/p/openjpeg/source/detail?r=1727

  • https://bugzilla.redhat.com/show_bug.cgi?id=835767

Связанные уязвимости

ubuntu
больше 13 лет назад

Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.

redhat
больше 13 лет назад

Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.

nvd
больше 13 лет назад

Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.

github
больше 3 лет назад

Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.

oracle-oval
больше 13 лет назад

ELSA-2012-1068: openjpeg security update (IMPORTANT)