CVE-2018-6616
Summary
| CVE | CVE-2018-6616 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-02-04 22:29:00 UTC |
| Updated | 2021-02-03 16:12:00 UTC |
| Description | In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Oracle Critical Patch Update Advisory - July 2020 |
MISC |
www.oracle.com |
Third Party Advisory |
| Debian -- Security Information -- DSA-4405-1 openjpeg2 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| [SECURITY] [DLA 1614-1] openjpeg2 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Excessive Iteration in opj_t1_encode_cblks (src/lib/openjp2/t1.c) · Issue #1059 · uclouvain/openjpeg · GitHub |
MISC |
github.com |
Exploit, Third Party Advisory |
| USN-4109-1: OpenJPEG vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500469 Alpine Linux Security Update for openjpeg
- 504226 Alpine Linux Security Update for openjpeg
- 752044 SUSE Enterprise Linux Security Update for openjpeg2 (SUSE-SU-2022:1252-1)