8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.013 Low
EPSS
Percentile
85.6%
Severity: Medium
Date : 2020-12-09
CVE-ID : CVE-2019-12973 CVE-2020-6851 CVE-2020-8112 CVE-2020-15389
CVE-2020-27814 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842
CVE-2020-27843 CVE-2020-27845
Package : openjpeg2
Type : multiple issues
Remote : No
Link : https://security.archlinux.org/AVG-1339
The package openjpeg2 before version 2.4.0-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 2.4.0-1.
The problems have been fixed upstream in version 2.4.0.
None.
In OpenJPEG before version 2.4.0, there is excessive iteration in the
opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could
leverage this vulnerability to cause a denial of service via a crafted
bmp file. This issue is similar to CVE-2018-6616.
OpenJPEG before version 2.4.0 has a heap-based buffer overflow in
opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of
opj_j2k_update_image_dimensions validation.
opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG before version
2.4.0 has a heap-based buffer overflow in the qmfbid==1 case, a
different issue than CVE-2020-6851.
jp2/opj_decompress.c in OpenJPEG before version 2.4.0 has a use-after-
free that can be triggered if there is a mix of valid and invalid files
in a directory operated on by the decompressor. Triggering a double-
free may also be possible. This is related to calling opj_image_destroy
twice.
A heap-buffer overwrite error was discovered in lib/openjp2/mqc.c in
OpenJPEG before version 2.4.0. The vulnerability causes an out-of-
bounds write, which may lead to remote denial of service or possibly
remote code execution.
In OpenJPEG before version 2.4.0, if too many decomposition levels are
supplied to the encoder, it could cause a global buffer overflow to
out-of-bounds read in the opj_dwt_calc_explicit_stepsizes() function.
An out-of-bounds read was discovered in lib/openjp2/pi.c:623 in
OpenJPEG before version 2.4.0.
A null pointer dereference issue was found in lib/openjp2/tgt.c when a
small precincts size, the option “-TP C” and non (0,0) grid offset are
given in OpenJPEG before version 2.4.0.
An out-of-bounds read was found in opj_t2_encode_packet when small
precincts and an origin shift are given in OpenJPEG before version
2.4.0.
An out-of-bounds read was discovered in lib/openjp2/pi.c:312 in
OpenJPEG before version 2.4.0.
A local attacker might be able to execute arbitrary code or crash the
application via crafted JPEG content.
https://bugs.archlinux.org/task/68906
https://github.com/uclouvain/openjpeg/issues/1222
https://github.com/uclouvain/openjpeg/pull/1185
https://github.com/uclouvain/openjpeg/commit/21399f6b7d318fcdf4406d5e88723c4922202aa3
https://github.com/uclouvain/openjpeg/commit/3aef207f90e937d4931daf6d411e092f76d82e66
https://github.com/uclouvain/openjpeg/issues/1228
https://github.com/uclouvain/openjpeg/pull/1229
https://github.com/uclouvain/openjpeg/commit/024b8407392cb0b82b04b58ed256094ed5799e04
https://github.com/uclouvain/openjpeg/issues/1231
https://github.com/uclouvain/openjpeg/pull/1232
https://github.com/uclouvain/openjpeg/commit/05f9b91e60debda0e83977e5e63b2e66486f7074
https://github.com/uclouvain/openjpeg/issues/1261
https://github.com/uclouvain/openjpeg/pull/1262
https://github.com/uclouvain/openjpeg/commit/e8e258ab049240c2dd1f1051b4e773b21e2d3dc0
https://github.com/uclouvain/openjpeg/issues/1283
https://github.com/uclouvain/openjpeg/pull/1303
https://github.com/uclouvain/openjpeg/commit/4ce7d285a55d29b79880d0566d4b010fe1907aa9
https://github.com/uclouvain/openjpeg/issues/1286
https://github.com/uclouvain/openjpeg/pull/1292
https://github.com/uclouvain/openjpeg/commit/6daf5f3e1ec6eff03b7982889874a3de6617db8d
https://github.com/uclouvain/openjpeg/issues/1293
https://github.com/uclouvain/openjpeg/pull/1295
https://github.com/uclouvain/openjpeg/pull/1300
https://github.com/uclouvain/openjpeg/commit/c9380ed0f8cc4794fc71d556ea23ae61e32247af
https://github.com/uclouvain/openjpeg/commit/00383e162ae2f8fc951f5745bf1011771acb8dce
https://github.com/uclouvain/openjpeg/issues/1294
https://github.com/uclouvain/openjpeg/pull/1296
https://github.com/uclouvain/openjpeg/commit/fbd30b064f8f9607d500437b6fedc41431fd6cdc
https://github.com/uclouvain/openjpeg/issues/1297
https://github.com/uclouvain/openjpeg/pull/1298
https://github.com/uclouvain/openjpeg/commit/38d661a3897052c7ff0b39b30c29cb067e130121
https://github.com/uclouvain/openjpeg/issues/1302
https://github.com/uclouvain/openjpeg/pull/1304
https://github.com/uclouvain/openjpeg/commit/8f5aff1dff510a964d3901d0fba281abec98ab63
https://security.archlinux.org/CVE-2019-12973
https://security.archlinux.org/CVE-2020-6851
https://security.archlinux.org/CVE-2020-8112
https://security.archlinux.org/CVE-2020-15389
https://security.archlinux.org/CVE-2020-27814
https://security.archlinux.org/CVE-2020-27824
https://security.archlinux.org/CVE-2020-27841
https://security.archlinux.org/CVE-2020-27842
https://security.archlinux.org/CVE-2020-27843
https://security.archlinux.org/CVE-2020-27845
bugs.archlinux.org/task/68906
github.com/uclouvain/openjpeg/commit/00383e162ae2f8fc951f5745bf1011771acb8dce
github.com/uclouvain/openjpeg/commit/024b8407392cb0b82b04b58ed256094ed5799e04
github.com/uclouvain/openjpeg/commit/05f9b91e60debda0e83977e5e63b2e66486f7074
github.com/uclouvain/openjpeg/commit/21399f6b7d318fcdf4406d5e88723c4922202aa3
github.com/uclouvain/openjpeg/commit/38d661a3897052c7ff0b39b30c29cb067e130121
github.com/uclouvain/openjpeg/commit/3aef207f90e937d4931daf6d411e092f76d82e66
github.com/uclouvain/openjpeg/commit/4ce7d285a55d29b79880d0566d4b010fe1907aa9
github.com/uclouvain/openjpeg/commit/6daf5f3e1ec6eff03b7982889874a3de6617db8d
github.com/uclouvain/openjpeg/commit/8f5aff1dff510a964d3901d0fba281abec98ab63
github.com/uclouvain/openjpeg/commit/c9380ed0f8cc4794fc71d556ea23ae61e32247af
github.com/uclouvain/openjpeg/commit/e8e258ab049240c2dd1f1051b4e773b21e2d3dc0
github.com/uclouvain/openjpeg/commit/fbd30b064f8f9607d500437b6fedc41431fd6cdc
github.com/uclouvain/openjpeg/issues/1222
github.com/uclouvain/openjpeg/issues/1228
github.com/uclouvain/openjpeg/issues/1231
github.com/uclouvain/openjpeg/issues/1261
github.com/uclouvain/openjpeg/issues/1283
github.com/uclouvain/openjpeg/issues/1286
github.com/uclouvain/openjpeg/issues/1293
github.com/uclouvain/openjpeg/issues/1294
github.com/uclouvain/openjpeg/issues/1297
github.com/uclouvain/openjpeg/issues/1302
github.com/uclouvain/openjpeg/pull/1185
github.com/uclouvain/openjpeg/pull/1229
github.com/uclouvain/openjpeg/pull/1232
github.com/uclouvain/openjpeg/pull/1262
github.com/uclouvain/openjpeg/pull/1292
github.com/uclouvain/openjpeg/pull/1295
github.com/uclouvain/openjpeg/pull/1296
github.com/uclouvain/openjpeg/pull/1298
github.com/uclouvain/openjpeg/pull/1300
github.com/uclouvain/openjpeg/pull/1303
github.com/uclouvain/openjpeg/pull/1304
security.archlinux.org/AVG-1339
security.archlinux.org/CVE-2019-12973
security.archlinux.org/CVE-2020-15389
security.archlinux.org/CVE-2020-27814
security.archlinux.org/CVE-2020-27824
security.archlinux.org/CVE-2020-27841
security.archlinux.org/CVE-2020-27842
security.archlinux.org/CVE-2020-27843
security.archlinux.org/CVE-2020-27845
security.archlinux.org/CVE-2020-6851
security.archlinux.org/CVE-2020-8112
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.013 Low
EPSS
Percentile
85.6%