Out-of-Bounds Affecting openjpeg2 package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.14% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-OPENJPEG2-345982
  • published30 Oct 2016
  • disclosed30 Oct 2016

Introduced: 30 Oct 2016

CVE-2016-9115  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable openjpeg2.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openjpeg2 package and not the openjpeg2 package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.