8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.013 Low
EPSS
Percentile
85.6%
Sebastian Poeplau discovered that OpenJPEG incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 18.04
LTS. (CVE-2020-6851, CVE-2020-8112)
It was discovered that OpenJPEG incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS.
(CVE-2020-15389, CVE-2020-27814, CVE-2020-27823, CVE-2020-27824,
CVE-2020-27841, CVE-2020-27845)
It was discovered that OpenJPEG incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2020-27842, CVE-2020-27843)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | libopenjp3d7 | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp2-7 | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp2-7-dbgsym | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp2-7-dev | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp2-tools | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp2-tools-dbgsym | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp3d-tools | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp3d-tools-dbgsym | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjp3d7-dbgsym | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libopenjpip-dec-server | < 2.3.0-2+deb10u2build0.18.04.1 | UNKNOWN |
ubuntu.com/security/CVE-2020-15389
ubuntu.com/security/CVE-2020-27814
ubuntu.com/security/CVE-2020-27823
ubuntu.com/security/CVE-2020-27824
ubuntu.com/security/CVE-2020-27841
ubuntu.com/security/CVE-2020-27842
ubuntu.com/security/CVE-2020-27843
ubuntu.com/security/CVE-2020-27845
ubuntu.com/security/CVE-2020-6851
ubuntu.com/security/CVE-2020-8112
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.013 Low
EPSS
Percentile
85.6%