Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16375

Опубликовано: 03 сент. 2018
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6openjpegWill not fix
Red Hat Enterprise Linux 7openjpegNot affected
Red Hat Enterprise Linux 8openjpeg2Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1626088openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c

EPSS

Процентиль: 63%
0.00437
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.

CVSS3: 8.8
nvd
больше 7 лет назад

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.

CVSS3: 8.8
debian
больше 7 лет назад

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_i ...

CVSS3: 8.8
github
больше 3 лет назад

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.

suse-cvrf
почти 4 года назад

Security update for openjpeg2

EPSS

Процентиль: 63%
0.00437
Низкий

7 High

CVSS3