CVE-2019-15145Out-of-bounds Read in Djvulibre

CWE-125Out-of-bounds Read10 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.5%
top 35.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 18
Latest updateMay 24

Description

DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/djvulibre< djvulibre 3.5.27.1-11 (bookworm)
Debiandjvulibre_project/djvulibre< 3.5.27.1-11+3
NVDopensuse/leap15.0, 15.1+1

Also affects: Debian Linux 10.0, 11.0, 8.0, 9.0, Fedora 29, 30, 31, Ubuntu Linux 16.04, 18.04, 19.04, 19.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fhqx-x8f6-2w5w: DjVuLibre 32022-05-24
OSV
CVE-2019-15145: DjVuLibre 32019-08-18

📋Vendor Advisories

2
Ubuntu
DjVuLibre vulnerabilities2019-11-21
Debian
CVE-2019-15145: djvulibre - DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (applicati...2019

💬Community

5
Bugzilla
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [epel-6]2019-11-01
Bugzilla
CVE-2019-15145 mingw-djvulibre: djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [fedora-all]2019-11-01
Bugzilla
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h2019-11-01
Bugzilla
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [epel-7]2019-11-01
Bugzilla
CVE-2019-15145 djvulibre: out-of-bounds read in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h [fedora-all]2019-11-01
CVE-2019-15145 — Out-of-bounds Read in Debian Djvulibre | cvebase