Out-of-bounds read in OpenJPEG - CVE-2016-3183
Published: May 19, 2022
OpenJPEG
openjpeg.org
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the sycc422_t_rgb() function in common/color.c. A remote attacker can create a specially crafted JPEG 2000 image, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
Remediation
External links
- http://www.openwall.com/lists/oss-security/2016/03/16/17
- https://bugzilla.redhat.com/show_bug.cgi?id=1317821
- https://github.com/uclouvain/openjpeg/commit/15f081c89650dccee4aa4ae66f614c3fdb268767
- https://github.com/uclouvain/openjpeg/issues/726
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FFMOZOF2EI6N2CR23EQ5EATWLQKBMHW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BJM23YERMEC6LCTWBUH7LZURGSLZDFDH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFRD35RIPRCGZA5DKAKHZ62LMP2A5UT7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPMDEUIMHTLKMHELDL4F4HZ7X4Y34JEB/
- https://security.gentoo.org/glsa/201612-26
- https://www.oracle.com/security-alerts/cpujul2020.html