Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-1923
HistoryJan 27, 2016 - 12:00 a.m.

CVE-2016-1923

2016-01-2700:00:00
ubuntu.com
ubuntu.com
11

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.006 Low

EPSS

Percentile

79.0%

Heap-based buffer overflow in the opj_j2k_update_image_data function in
OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service
(out-of-bounds read and application crash) via a crafted JPEG 2000 image.

Bugs

Notes

Author Note
ccdm94 in issue 704, which references this CVE, there is mention of commit d26481f24bd (mayeut/openjpeg), which seems to be aimed at fixing this issue. This commit, however, was not included by upstream. The code has changed to something that is similar to what is proposed in the previously mentioned non-merged commit, and the commit that did this was ad593c9e062. This seems to be the same fix as the one for CVE-2016-3182. Considering that this is the fix for the issue, even if package openjpeg (versions 1.x) is affected (PoC does not reproduce), the only likely upstream patch does not apply as the function being patched does not exist in versions 1.x. No other possible patch has been explicitly provided by upstream.
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchopenjpeg2< 2.1.2-1.1+deb9u2build0.1UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.006 Low

EPSS

Percentile

79.0%