Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17479

Опубликовано: 08 дек. 2017
Источник: debian

Описание

In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjpeg2fixed2.3.0-2package

Примечания

  • https://github.com/uclouvain/openjpeg/issues/1044

  • https://github.com/uclouvain/openjpeg/commit/0bc90e4062a5f9258c91eca018c019b179066c62 (v2.3.1)

  • Debian packaging does not build JPWL, has BUILD_JPWL:BOOL=OFF

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.

CVSS3: 5.3
redhat
около 8 лет назад

In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.

CVSS3: 9.8
nvd
около 8 лет назад

In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.

suse-cvrf
больше 7 лет назад

Security update for openjpeg2