CVE-2019-15145 — Out-of-bounds Read in Djvulibre
Severity
5.5MEDIUMNVD
EPSS
0.5%
top 35.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 18
Latest updateMay 24
Description
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Debian Linux 10.0, 11.0, 8.0, 9.0, Fedora 29, 30, 31, Ubuntu Linux 16.04, 18.04, 19.04, 19.10
Patches
🔴Vulnerability Details
2📋Vendor Advisories
2💬Community
5Bugzilla▶
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [epel-6]↗2019-11-01
Bugzilla▶
CVE-2019-15145 mingw-djvulibre: djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [fedora-all]↗2019-11-01
Bugzilla▶
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h↗2019-11-01
Bugzilla▶
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [epel-7]↗2019-11-01
Bugzilla▶
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [fedora-all]↗2019-11-01