The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_malloc.c.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/ | Patch Third Party Advisory VDB Entry |
https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | Issue Tracking Patch Third Party Advisory |
https://github.com/uclouvain/openjpeg/issues/983 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201710-26 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-08-21 07:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-12982
Mitre link : CVE-2017-12982
CVE.ORG link : CVE-2017-12982
JSON object : View
Products Affected
uclouvain
- openjpeg
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer