LingalaShalini / openjpeg-2.3.0_after_fix

Other
0 stars 0 forks source link

CVE-2023-2731 (Medium) detected in openjpeg5875a6b44618fb7dfd5cd6d742533eaee2014060 #71

Open mend-bolt-for-github[bot] opened 12 months ago

mend-bolt-for-github[bot] commented 12 months ago

CVE-2023-2731 - Medium Severity Vulnerability

Vulnerable Library - openjpeg5875a6b44618fb7dfd5cd6d742533eaee2014060

Official repository of the OpenJPEG project

Library home page: https://github.com/uclouvain/openjpeg.git

Found in HEAD commit: 706b09e38f53ed9d9d022c131ae6564061484cfd

Found in base branch: master

Vulnerable Source Files (1)

/thirdparty/libtiff/tif_lzw.c

Vulnerability Details

A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.

Publish Date: 2023-05-17

URL: CVE-2023-2731

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here