Vulnerability Details : CVE-2017-14164
Potential exploit
A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c) or possibly remote code execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14152.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2017-14164
- cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-14164
0.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-14164
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-14164
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-14164
-
https://github.com/uclouvain/openjpeg/commit/dcac91b8c72f743bda7dbfa9032356bc8110098a
opj_j2k_write_sot(): fix potential write heap buffer overflow (#991) · uclouvain/openjpeg@dcac91b · GitHubExploit;Issue Tracking;Patch;Third Party Advisory
-
https://github.com/uclouvain/openjpeg/issues/991
heap-based buffer overflow in opj_write_bytes_LE (cio.c) (unfixed #985) · Issue #991 · uclouvain/openjpeg · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/201710-26
OpenJPEG: Multiple vulnerabilities (GLSA 201710-26) — Gentoo securityThird Party Advisory
-
http://www.securityfocus.com/bid/100677
OpenJPEG CVE-2017-14164 Incomplete Fix Remote Heap Based Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
https://blogs.gentoo.org/ago/2017/09/06/heap-based-buffer-overflow-in-opj_write_bytes_le-cio-c-incomplete-fix-for-cve-2017-14152/
openjpeg: heap-based buffer overflow in opj_write_bytes_LE (cio.c) (INCOMPLETE FIX FOR CVE-2017-14152) | agostino's blogPatch;Third Party Advisory;VDB Entry
Jump to