Vulnerability Name: | CVE-2016-3183 (CCN-111547) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-03-14 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2016-03-14 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-09-09 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The sycc422_t_rgb function in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted jpeg2000 file. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
3.7 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-3183 Source: CCN Type: oss-sec Mailing List, Mon, 14 Mar 2016 06:51:58 +0000 CVE request - OpenJPEG : Out-Of-Bounds Read in sycc422_to_rgb function Source: CCN Type: oss-sec Mailing List, Wed, 16 Mar 2016 15:46:17 -0400 (EDT) Re: CVE request - OpenJPEG : Out-Of-Bounds Read in sycc422_to_rgb function Source: CCN Type: OpenJPEG Web site OpenJPEG Source: MLIST Type: Mailing List, Patch [oss-security] 20160316 Re: CVE request - OpenJPEG : Out-Of-Bounds Read in sycc422_to_rgb function Source: CONFIRM Type: Issue Tracking, Patch https://bugzilla.redhat.com/show_bug.cgi?id=1317821 Source: XF Type: UNKNOWN openjpeg-cve20163183-dos(111547) Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/uclouvain/openjpeg/commit/15f081c89650dccee4aa4ae66f614c3fdb268767 Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/uclouvain/openjpeg/issues/726 Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-14d8f9b4ed Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-8fa7ced365 Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-d2ab705e4a Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-abdc548f46 Source: GENTOO Type: Patch, Third Party Advisory, VDB Entry GLSA-201612-26 Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpujul2020.html | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |