Revision Date: | 2014-04-18 | Version: | 1 | Title: | CVE-2013-4290 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | Stack-based buffer overflow in OpenJPEG before 1.5.2 allows remote attackers to have unspecified impact via unknown vectors to (1) lib/openjp3d/opj_jp3d_compress.c, (2) bin/jp3d/convert.c, or (3) lib/openjp3d/event.c.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2013-4290
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT libopenjpeg-java package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT libopenjpeg5 package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT openjpeg-tools package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT openjpip-dec-server package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT openjpip-server package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT openjpip-viewer package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
OR NOT openjpip-viewer-xerces package in xenial, while related to the CVE in some way, is not affected (note: 'code not present').
|
|