A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
CVE-2020-27824 - Medium Severity Vulnerability
Vulnerable Library - openjpegv2.3.0
Official repository of the OpenJPEG project
Library home page: https://github.com/uclouvain/openjpeg.git
Found in HEAD commit: 0d39a9fe2941557ce58f542f225cc7ce2bc00d4f
Found in base branch: master
Vulnerable Source Files (1)
Vulnerability Details
A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Publish Date: 2021-05-13
URL: CVE-2020-27824
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-27824
Release Date: 2021-05-13
Fix Resolution: openjpeg2-tools-debuginfo - 2.4.0-4,2.4.0-4;openjpeg2-debugsource - 2.4.0-4,2.4.0-4;openjpeg2-tools - 2.4.0-4,2.4.0-4,2.4.0-4,2.4.0-4;openjpeg2-debuginfo - 2.4.0-4,2.4.0-4;openjpeg2-devel-docs - 2.4.0-4;openjpeg2 - 2.4.0-4,2.4.0-4,2.4.0-4,2.4.0-4,2.4.0-4,2.4.0-4
Step up your Open Source Security Game with Mend here