CVE-2017-14151
Publication date 5 September 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An off-by-one error was discovered in opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_mqc_flush in lib/openjp2/mqc.c and opj_t1_encode_cblk in lib/openjp2/t1.c) or possibly remote code execution.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjpeg | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
openjpeg2 | 18.04 LTS bionic |
Fixed 2.3.0-1
|
16.04 LTS xenial |
Fixed 2.1.2-1.1+deb9u2build0.1
|
|
14.04 LTS trusty | Not in release |
Notes
ccdm94
It seems like the vulnerable code was introduced by commit e05d2901e, which was applied in versions larger than 2.0.0. Therefore, openjpeg packages are not affected by this issue.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |