Buffer overflow in OpenJPEG - CVE-2012-3358
Published: July 19, 2012 / Updated: August 11, 2020
OpenJPEG
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
How to mitigate CVE-2012-3358
Sources
- http://code.google.com/p/openjpeg/source/detail?r=1727
- http://osvdb.org/83741
- http://rhn.redhat.com/errata/RHSA-2012-1068.html
- http://secunia.com/advisories/49913
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:104
- http://www.openwall.com/lists/oss-security/2012/07/11/1
- http://www.securityfocus.com/bid/54373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76850