Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-27844
HistoryJan 05, 2021 - 12:00 a.m.

CVE-2020-27844

2021-01-0500:00:00
ubuntu.com
ubuntu.com
21

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:P/I:P/A:C

0.001 Low

EPSS

Percentile

43.6%

A flaw was found in openjpeg’s src/lib/openjp2/t2.c in versions prior to
2.4.0. This flaw allows an attacker to provide crafted input to openjpeg
during conversion and encoding, causing an out-of-bounds write. The highest
threat from this vulnerability is to confidentiality, integrity, as well as
system availability.

Notes

Author Note
ebarretto The fix for this CVE was not applied in 2.1.2-1.1+deb9u6 even though it was mentioned in the changelog and the patch is also in debian/patches/
ccdm94 the vulnerable code was introduced by commit 4edb8c8337, which was applied to be a part of version 2.4.0 of openjpeg.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:P/I:P/A:C

0.001 Low

EPSS

Percentile

43.6%