CVE-2016-1626

Published on: 02/13/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Certain versions of Debian Linux from Debian contain the following vulnerability:

The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.

  • CVE-2016-1626 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 4.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
OpenJPEG: Multiple vulnerabilities (GLSA 201710-26) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201710-26
571480 - chromium - An open-source project to help move the web forward. - Monorail code.google.com
text/html
URL Logo CONFIRM code.google.com/p/chromium/issues/detail?id=571480
Zero Day Initiative www.zerodayinitiative.com
text/html
URL Logo MISC www.zerodayinitiative.com/advisories/ZDI-16-171
Google Chrome Prior to 48.0.2564.109 Multiple Security Vulnerabilities cve.report (archive)
text/html
URL Logo BID 83125
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0241
Issue 1583233008: openjpeg: Set proper upper bound for an array in opj_pi_update_decode_poc(). - Code Review codereview.chromium.org
text/html
URL Logo CONFIRM codereview.chromium.org/1583233008
Chrome Releases: Stable Channel Update Vendor Advisory
googlechromereleases.blogspot.com
text/html
URL Logo CONFIRM googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html
openSUSE-SU-2016:0518-1: moderate: Security update for Chromium Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0518
Chromium: Multiple vulnerabilities (GLSA 201603-09) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201603-09
Debian -- Security Information -- DSA-3486-1 chromium-browser Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3486
Google Chrome Bugs Let Remote Users Execute Arbitrary Code and Bypass Security Restrictions - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035183
openSUSE-SU-2016:0491-1: moderate: Security update for Chromium lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:0491

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationGoogleChrome48.0.2564.103AllAllAll
ApplicationGoogleChrome48.0.2564.103AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*:
  • cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*: