Vulnerability Details : CVE-2016-1681
Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2016-1681
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1681
1.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1681
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-1681
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1681
-
https://security.gentoo.org/glsa/201607-07
Chromium: Multiple vulnerabilities (GLSA 201607-07) — Gentoo security
-
http://www.securityfocus.com/bid/90876
Google Chrome Prior to 51.0.2704.63 Multiple Security Vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
[security-announce] openSUSE-SU-2016:1496-1: important: Security updateThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
[security-announce] openSUSE-SU-2016:1430-1: important: Security updateThird Party Advisory
-
https://codereview.chromium.org/2001663002
Issue 2001663002: openjpeg: Prevent a buffer overflow in opj_j2k_read_SPCod_SPCoc. - Code ReviewIssue Tracking
-
https://crbug.com/613160
613160 - Security: Cisco Talos Security Advisory for Google chrome product - TALOS-CAN-0174 - chromium - MonorailPermissions Required
-
http://www.securitytracker.com/id/1035981
Google Chrome Multiple Flaws Lets Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code - SecurityTrackerThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2016:1190
RHSA-2016:1190 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.debian.org/security/2016/dsa-3590
Debian -- Security Information -- DSA-3590-1 chromium-browserThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
[security-announce] openSUSE-SU-2016:1433-1: important: Security updateThird Party Advisory
-
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
Chrome Releases: Stable Channel UpdateVendor Advisory
Jump to