Vulnerability Name: | CVE-2016-4797 (CCN-114955) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-05-12 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2016-05-12 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2020-09-09 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. Note: this issue exists because of an incorrect fix for CVE-2014-7947. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-369 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-4797 Source: CCN Type: oss-sec Mailing List, Thu, 12 May 2016 23:53:59 -0400 (EDT) Re: CVE Request - OpenJPEG: Security Fixes Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20160512 Re: CVE Request - OpenJPEG: Security Fixes Source: CONFIRM Type: Issue Tracking, Patch https://bugzilla.redhat.com/show_bug.cgi?id=1335483 Source: XF Type: UNKNOWN openjpeg-cve20164797-dos(114955) Source: CCN Type: OpenJPEG GIT Repository Official repository of the OpenJPEG project Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/uclouvain/openjpeg/issues/733 Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-14d8f9b4ed Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-8fa7ced365 Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-d2ab705e4a Source: FEDORA Type: Patch, Third Party Advisory FEDORA-2016-abdc548f46 Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpujul2020.html | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |