CVE-2016-1923 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Openjpeg
Severity
6.5MEDIUMNVD
EPSS
0.5%
top 35.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 27
Latest updateMay 13
Description
Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
3GHSA▶
GHSA-6h2h-qgx7-79mr: Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016↗2022-05-13
OSV▶
CVE-2016-1923: Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016↗2016-01-27
CVEList▶
CVE-2016-1923: Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016↗2016-01-27
📋Vendor Advisories
2💬Community
9Bugzilla▶
CVE-2016-1923 mingw-openjpeg: openjpeg: out of bounds read in opj_j2k_update_image_data [fedora-all]↗2016-01-19