ID CVE-2017-17480
Summary In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
References
Vulnerable Configurations
  • cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
CVSS
Base: 7.5 (as of 03-02-2021 - 16:07)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
debian DSA-4405
misc https://github.com/uclouvain/openjpeg/issues/1044
mlist [debian-lts-announce] 20181120 [SECURITY] [DLA 1579-1] openjpeg2 security update
ubuntu USN-4109-1
Last major update 03-02-2021 - 16:07
Published 08-12-2017 - 19:29
Last modified 03-02-2021 - 16:07
Back to Top