CVE-2016-3183

Published on: 02/03/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:03 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Certain versions of Openjpeg from Uclouvain contain the following vulnerability:

The sycc422_t_rgb function in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted jpeg2000 file.

  • CVE-2016-3183 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
OpenJPEG: Multiple vulnerabilities (GLSA 201612-26) — Gentoo Security Patch
Third Party Advisory
VDB Entry
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201612-26
Fix Out-Of-Bounds Read in sycc42x_to_rgb function (#745) · uclouvain/[email protected] · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/uclouvain/openjpeg/commit/15f081c89650dccee4aa4ae66f614c3fdb268767
Oracle Critical Patch Update Advisory - July 2020 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujul2020.html
Bug 1317821 – CVE-2016-3183 openjpeg: Out-of-bounds read in sycc422_to_rgb function Issue Tracking
Patch
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1317821
CVE-2016-3183 Out-Of-Bounds Read in sycc422_to_rgb function · Issue #726 · uclouvain/openjpeg · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/uclouvain/openjpeg/issues/726
oss-security - Re: CVE request - OpenJPEG : Out-Of-Bounds Read in sycc422_to_rgb function Mailing List
Patch
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160316 Re: CVE request - OpenJPEG : Out-Of-Bounds Read in sycc422_to_rgb function
[SECURITY] Fedora 24 Update: openjpeg2-2.1.1-1.fc24 - package-announce - Fedora Mailing-Lists Patch
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-abdc548f46
[SECURITY] Fedora 24 Update: mingw-openjpeg2-2.1.1-1.fc24 - package-announce - Fedora Mailing-Lists Patch
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-8fa7ced365
[SECURITY] Fedora 23 Update: mingw-openjpeg2-2.1.1-1.fc23 - package-announce - Fedora Mailing-Lists Patch
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-14d8f9b4ed
[SECURITY] Fedora 23 Update: openjpeg2-2.1.1-1.fc23 - package-announce - Fedora Mailing-Lists Patch
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-d2ab705e4a

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationUclouvainOpenjpegAllAllAllAll
  • cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*: